reginanegra
New Member
- Joined
- Feb 1, 2011
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-19032-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue Feb 1 10:22:12.084 2011 (UTC - 5:00)
System Uptime: 0 days 0:58:47.860
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {90, 2, 0, fffff80002a94995}
Unable to load image \SystemRoot\System32\Drivers\msrpc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for msrpc.sys
*** ERROR: Module load completed but symbols could not be loaded for msrpc.sys
Probably caused by : msrpc.sys ( msrpc+261c8 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000090, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a94995, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
0000000000000090
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+1d5
fffff800`02a94995 488bbb90000000 mov rdi,qword ptr [rbx+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: slui.exe
TRAP_FRAME: fffff88007e272b0 -- (.trap 0xfffff88007e272b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007e27400
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a94995 rsp=fffff88007e27440 rbp=0000000000000001
r8=fffffa8005a03af8 r9=0000000000000000 r10=fffffffffffffffd
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiCommitThreadWait+0x1d5:
fffff800`02a94995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8cca9 to fffff80002a8d740
STACK_TEXT:
fffff880`07e27168 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07e27170 fffff800`02a8b920 : 00000000`00000000 00000000`00000000 fffffa80`00000001 fffffa80`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`07e272b0 fffff800`02a94995 : fffffa80`06627b60 fffffa80`06627b60 fffff800`02dfce00 fffff800`00000009 : nt!KiPageFault+0x260
fffff880`07e27440 fffff800`02a96cff : fffff880`009e8180 fffff880`009e8180 00000000`00000040 fffffa80`03c1f590 : nt!KiCommitThreadWait+0x1d5
fffff880`07e274d0 fffff880`00dbe1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`06988c00 : nt!KeWaitForSingleObject+0x19f
fffff880`07e27570 00000000`00000000 : fffff8a0`00000000 00000000`00000000 fffffa80`06988c00 fffff880`009e8180 : msrpc+0x261c8
STACK_COMMAND: kb
FOLLOWUP_IP:
msrpc+261c8
fffff880`00dbe1c8 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: msrpc+261c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msrpc
IMAGE_NAME: msrpc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0xA_msrpc+261c8
BUCKET_ID: X64_0xA_msrpc+261c8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-31777-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
Debug session time: Tue Feb 1 09:22:32.165 2011 (UTC - 5:00)
System Uptime: 0 days 2:11:54.789
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F7, {fffff88007d3a220, 1dc29e234b4c, ffffe23d61dcb4b3, 0}
Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: fffff88007d3a220, Actual security check cookie from the stack
Arg2: 00001dc29e234b4c, Expected security check cookie
Arg3: ffffe23d61dcb4b3, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
DEFAULT_BUCKET_ID: GS_FALSE_POSITIVE_MISSING_GSFRAME
SECURITY_COOKIE: Expected 00001dc29e234b4c found fffff88007d3a220
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0xF7
PROCESS_NAME: slui.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b594c5 to fffff80002ac4740
STACK_TEXT:
fffff880`07d3a198 fffff800`02b594c5 : 00000000`000000f7 fffff880`07d3a220 00001dc2`9e234b4c ffffe23d`61dcb4b3 : nt!KeBugCheckEx
fffff880`07d3a1a0 fffff800`02a9fa52 : fffff880`00001000 00000000`00000000 fffff880`01a00000 fffff880`07d3a280 : nt!_report_gsfailure+0x25
fffff880`07d3a1e0 fffff800`02aa79fe : fffffa80`0430b430 fffff8a0`09c13000 fffffa80`042f38c0 fffffa80`00000000 : nt!EtwpEventWriteFull+0x4b2
fffff880`07d3a450 fffff800`02e6c2f6 : 00000000`00000034 00000000`ff9e00f0 fffff880`07d3a758 fffff880`07d3a740 : nt!EtwWrite+0xae
fffff880`07d3a4c0 fffff800`02b332ea : fffffa80`03b57000 00000000`00000000 00000000`ff9e0000 fffff800`02da0000 : nt!EtwpPsProvTraceImage+0x1c5
fffff880`07d3a5a0 fffff800`02d1fdc5 : fffffa80`06255d00 fffffa80`03b57000 fffff8a0`00002000 fffff880`07d3a758 : nt! ?? ::FNODOBFM::`string'+0x29333
fffff880`07d3a6c0 fffff800`02d8143e : fffffa80`039c1b30 00000000`00000000 fffffa80`0436c3e0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210c6
fffff880`07d3a860 fffff800`02da9cd4 : 000007ff`fffd6000 fffff880`07d3abe0 00000000`00000000 fffffa80`05a54710 : nt!PspExitProcess+0x4e
fffff880`07d3a8c0 fffff800`02d82635 : 00000000`00000000 fffff800`02dc3101 000007ff`fffd6000 00000000`00000000 : nt!PspExitThread+0x834
fffff880`07d3a980 fffff800`02aa11db : fffffa80`03f80b01 fffffa80`03f9d290 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`07d3a9b0 fffff800`02aa1620 : 00000000`0013fb40 fffff880`07d3aa30 fffff800`02d8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`07d3aa30 fffff800`02ac3a37 : 00000000`0000039d 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`07d3ab70 00000000`7772008a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0202eed8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7772008a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!_report_gsfailure+25
fffff800`02b594c5 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!_report_gsfailure+25
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25
BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nt!_report_gsfailure+25
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-17596-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Tue Feb 1 10:31:52.405 2011 (UTC - 5:00)
System Uptime: 0 days 0:08:53.153
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002a912b3}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a912b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca90e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02a912b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88005483630 -- (.trap 0xfffff88005483630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880054836e8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a912b3 rsp=fffff880054837c0 rbp=0000000000000000
r8=fffffa80051eb420 r9=fffff880054838c0 r10=0000000000000002
r11=fffffa80051dc240 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02a912b3 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a70ca9 to fffff80002a71740
STACK_TEXT:
fffff880`054834e8 fffff800`02a70ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`054834f0 fffff800`02a6f920 : 00000000`00000000 fffffa80`044084d0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`05483630 fffff800`02a912b3 : fffffa80`068a4560 fffff800`02a775da 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`054837c0 fffff800`02a4e0c7 : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe541`00000000 : nt!IopCompleteRequest+0xae3
fffff880`05483890 fffff800`02a78b9d : fffff880`009eae40 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`05483910 fffff800`02a7c2a1 : fffffa80`06074ec8 fffffa80`068a4560 fffffa80`00000046 fffff8a0`01f611d0 : nt!KiCommitThreadWait+0x3dd
fffff880`054839a0 fffff800`02d6cdf7 : fffffa80`00010000 fffff880`05483b88 00000000`00000001 fffff880`05483b00 : nt!KeRemoveQueueEx+0x301
fffff880`05483a50 fffff800`02a81aa6 : 00000000`00000000 fffff880`05483b68 fffff880`05483b88 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`05483ae0 fffff800`02a70993 : fffffa80`068a4560 00000000`77ca4270 fffff880`05483c60 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`05483be0 00000000`77bf165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0c1ff678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf165a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02a6f920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-20046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Tue Feb 1 10:37:58.770 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:50.518
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002d6fc9a, fffff88007961cb0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpDeleteNameCheck+2a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d6fc9a, Address of the instruction which caused the bugcheck
Arg3: fffff88007961cb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObpDeleteNameCheck+2a
fffff800`02d6fc9a f0480fba691000 lock bts qword ptr [rcx+10h],0
CONTEXT: fffff88007961cb0 -- (.cxr 0xfffff88007961cb0)
rax=fffffa80073d2060 rbx=0000000000000000 rcx=0000000107868300
rdx=fffffa80066881e1 rsi=0000000107868300 rdi=0000000000000200
rip=fffff80002d6fc9a rsp=fffff88007962680 rbp=0050e0c24f000000
r8=fffffa80066881e0 r9=fffff80002bede80 r10=fffffa8003a49c10
r11=fffffa8006ba4190 r12=fffffa8000000000 r13=0000000000000001
r14=fffffa8003a76c00 r15=fffff8a002f6bf90
iopl=0 nv up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010296
nt!ObpDeleteNameCheck+0x2a:
fffff800`02d6fc9a f0480fba691000 lock bts qword ptr [rcx+10h],0 ds:002b:00000001`07868310=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002d6fc9a
STACK_TEXT:
fffff880`07962680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpDeleteNameCheck+0x2a
FOLLOWUP_IP:
nt!ObpDeleteNameCheck+2a
fffff800`02d6fc9a f0480fba691000 lock bts qword ptr [rcx+10h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpDeleteNameCheck+2a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88007961cb0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpDeleteNameCheck+2a
BUCKET_ID: X64_0x3B_nt!ObpDeleteNameCheck+2a
Followup: MachineOwner
---------
start end module name
fffff880`0fe00000 fffff880`0fe45000 a6uj2290 a6uj2290.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`0102f000 fffff880`01086000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c00000 fffff880`02c8a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0fe55000 fffff880`0fe6b000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00fe8000 fffff880`00ff3000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04c33000 fffff880`04d3d000 arusb_win7x arusb_win7x.sys Thu Nov 26 03:55:17 2009 (4B0E4275)
fffff880`00e1a000 fffff880`00e23000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db0000 fffff880`00dda000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`03a00000 fffff880`03a6e000 avgldx64 avgldx64.sys Thu Jul 09 20:19:20 2009 (4A568908)
fffff880`03bb5000 fffff880`03bbb880 avgmfx64 avgmfx64.sys Wed Jul 01 16:38:25 2009 (4A4BC941)
fffff880`02d13000 fffff880`02d37000 avgtdia avgtdia.sys Mon Apr 06 09:43:58 2009 (49DA071E)
fffff880`0140c000 fffff880`01413000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03ba4000 fffff880`03bb5000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`067a0000 fffff880`067be000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000 cdd cdd.dll unavailable (00000000)
fffff880`00c60000 fffff880`00c8a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00e2a000 fffff880`00eea000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013d0000 fffff880`01400000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cf6000 fffff880`00d54000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0148c000 fffff880`014ff000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0fe45000 fffff880`0fe55000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`040c1000 fffff880`040cf000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03b03000 fffff880`03b86000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03b86000 fffff880`03ba4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03af4000 fffff880`03b03000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`015da000 fffff880`015f0000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04099000 fffff880`040bb000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`040db000 fffff880`040e4000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`040cf000 fffff880`040db000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041d2000 fffff880`041e5000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04d3d000 fffff880`04d49000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03eac000 fffff880`03fa0000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03fa0000 fffff880`03fe6000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03e74000 fffff880`03e81000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c4c000 fffff880`00c60000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`041b2000 fffff880`041bd000 flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c4c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01510000 fffff880`0151a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015a0000 fffff880`015da000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`017a4000 fffff880`017ee000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03fe6000 fffff880`03ff3000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02fdf000 fffff800`03028000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e00000 fffff880`03e24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04000000 fffff880`0405c000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04d83000 fffff880`04d9c000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04d9c000 fffff880`04da4080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04d75000 fffff880`04d83000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`066d8000 fffff880`067a0000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0161a000 fffff880`01623000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00fd0000 fffff880`00fd8000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03be2000 fffff880`03bf8000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03a79000 fffff880`03a88000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04da5000 fffff880`04db3000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9b000 fffff800`00b9e000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`040f7000 fffff880`0413a000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01472000 fffff880`0148c000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01779000 fffff880`017a4000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`040bb000 fffff880`040c0200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`041e5000 fffff880`041fa000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04dd7000 fffff880`04dfa000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c9e000 fffff880`00ce2000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04dc9000 fffff880`04dd7000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`040e6000 fffff880`040f5000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04dbc000 fffff880`04dc9000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`067be000 fffff880`067d6000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06600000 fffff880`0662d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06a97000 fffff880`06ae5000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`06ae5000 fffff880`06b08000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02ccc000 fffff880`02cd7000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01414000 fffff880`01472000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03ae9000 fffff880`03af4000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01608000 fffff880`0161a000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01627000 fffff880`01719000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03ff3000 fffff880`03fff000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`066ad000 fffff880`066c0000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe8f000 fffff880`0febe000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041bd000 fffff880`041d2000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02da2000 fffff880`02db1000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d37000 fffff880`02d7c000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01719000 fffff880`01779000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02cd7000 fffff880`02ce8000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03add000 fffff880`03ae9000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a03000 fffff800`02fdf000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122d000 fffff880`013d0000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04db3000 fffff880`04dbc000 NuidFltr NuidFltr.sys Fri May 08 04:53:31 2009 (4A03F30B)
fffff880`0121c000 fffff880`01225000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b6d000 fffff880`10b6e180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fedb000 fffff880`10b6ce00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`0665a000 fffff880`066ad000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d7c000 fffff880`02da2000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03e8d000 fffff880`03eaa000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0109d000 fffff880`010b2000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f9d000 fffff880`00fd0000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd8000 fffff880`00fe8000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014ff000 fffff880`01510000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06b08000 fffff880`06bae000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0405c000 fffff880`04099000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ce2000 fffff880`00cf6000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`0413a000 fffff880`04146000 PTSimBus PTSimBus.sys Wed Jun 17 22:20:48 2009 (4A39A480)
fffff880`0fe6b000 fffff880`0fe8f000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0febe000 fffff880`0fed9000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`10bc5000 fffff880`10be6000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`10be6000 fffff880`10c00000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a8c000 fffff880`03add000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03a6e000 fffff880`03a79000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02cb1000 fffff880`02cba000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cba000 fffff880`02cc3000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02cc3000 fffff880`02ccc000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01566000 fffff880`015a0000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`066c0000 fffff880`066d8000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e24000 fffff880`03e56000 Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`01000000 fffff880`0102f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06bae000 fffff880`06bb9000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03e81000 fffff880`03e8d000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02db1000 fffff880`02dce000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01600000 fffff880`01608000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06a00000 fffff880`06a71000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`010b5000 fffff880`011db000 sptd sptd.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`072f2000 fffff880`07388000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0728b000 fffff880`072f2000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06bb9000 fffff880`06be6000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`040f5000 fffff880`040f6480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06be6000 fffff880`06bf8000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d06000 fffff880`02d13000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02ce8000 fffff880`02d06000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02de9000 fffff880`02dfd000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004d0000 fffff960`004da000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03bbc000 fffff880`03be2000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04146000 fffff880`04158000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04d56000 fffff880`04d73000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04d73000 fffff880`04d74f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03e63000 fffff880`03e74000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04158000 fffff880`041b2000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10b6f000 fffff880`10bc5000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e56000 fffff880`03e63000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01090000 fffff880`0109d000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00c8a000 fffff880`00c98000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00dda000 fffff880`00dff000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017ee000 fffff880`017fe000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`011e4000 fffff880`011f9000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d54000 fffff880`00db0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0151a000 fffff880`01566000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04d49000 fffff880`04d56000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02dce000 fffff880`02de9000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02ca1000 fffff880`02cb1000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eea000 fffff880`00f8e000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c8a000 fffff880`02c93000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00080000 fffff960`0038f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`011db000 fffff880`011e4000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04c00000 fffff880`04c21000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`015f0000 fffff880`015fe000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01400000 fffff880`0140c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01200000 fffff880`01209000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01209000 fffff880`0121c000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
What do i do in that case?
cybercore said:1. Uninstall AVG,
AVG - Download tools
2. Install MSE:
Link Removed due to 404 Error
3. Uninstall Daemon Tools. Clear up with this tool:
DuplexSecure - FAQ
4. Update drivers:
Realtek PCI Lan
Rt64win7.sys Thu Feb 26 04:04:13 2009
BugCheck A, {8, 2, 0, fffff800036a5d29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-30685-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03659000 PsLoadedModuleList = 0xfffff800`03896e50
Debug session time: Wed Feb 2 06:25:46.497 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:33.245
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800036a5d29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800036a5d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800039010e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`036a5d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8000658d7e0 -- (.trap 0xfffff8000658d7e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8003ce4718 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036a5d29 rsp=fffff8000658d970 rbp=fffff80003843e80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`036a5d29 488b5108 mov rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036c8ca9 to fffff800036c9740
STACK_TEXT:
fffff800`0658d698 fffff800`036c8ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`0658d6a0 fffff800`036c7920 : fffff800`03843e80 fffffa80`0706ab60 fffff800`03846080 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`0658d7e0 fffff800`036a5d29 : fffff800`03843e80 fffffa80`03ce4701 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff800`0658d970 fffff800`036a8fec : fffffa80`0706ab60 00000000`00000002 00000000`00000000 fffffa80`03ce4718 : nt!KiInsertQueueApc+0x1e9
fffff800`0658d9a0 fffff800`036cc55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`0658da00 fffff880`00e8841a : 00000000`00000000 00000000`00000001 fffffa80`05d44580 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`0658dae0 fffff880`00e88242 : fffffa80`05d44580 fffffa80`047a2ea0 fffffa80`06919f40 fffffa80`06919f00 : ataport!IdeCompleteScsiIrp+0x62
fffff800`0658db10 fffff880`00e82e32 : 00000000`00000000 00000000`00000000 fffffa80`047a3300 fffff800`0363bc60 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`0658db40 fffff880`00e8b7ed : fffffa80`0396c1a0 fffffa80`05d44580 00000000`00000000 fffffa80`05d44580 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`0658dc70 fffff880`00e8b0ec : fffffa80`0396c1a0 00000000`00000000 fffffa80`0396c1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`0658dda0 fffff880`010664ce : fffffa80`046af000 fffff800`0658de88 fffffa80`0396c050 fffffa80`046af750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`0658de60 fffffa80`046af000 : fffff800`0658de88 fffffa80`0396c050 fffffa80`046af750 00000000`00000000 : sptd+0x424ce
fffff800`0658de68 fffff800`0658de88 : fffffa80`0396c050 fffffa80`046af750 00000000`00000000 fffffa80`0565ea10 : 0xfffffa80`046af000
fffff800`0658de70 fffffa80`0396c050 : fffffa80`046af750 00000000`00000000 fffffa80`0565ea10 ffffffff`0000ffff : 0xfffff800`0658de88
fffff800`0658de78 fffffa80`046af750 : 00000000`00000000 fffffa80`0565ea10 ffffffff`0000ffff 00000000`00000022 : 0xfffffa80`0396c050
fffff800`0658de80 00000000`00000000 : fffffa80`0565ea10 ffffffff`0000ffff 00000000`00000022 00000000`00000000 : 0xfffffa80`046af750
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e8841a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
start end module name
fffff880`01182000 fffff880`011d9000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cda000 fffff880`02d64000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`10b98000 fffff880`10bae000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ea9000 fffff880`00eb4000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`07cdd000 fffff880`07de7000 arusb_win7x arusb_win7x.sys Thu Nov 26 03:55:17 2009 (4B0E4275)
fffff880`00e76000 fffff880`00e7f000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e7f000 fffff880`00ea9000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`015f9000 fffff880`01600000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03b73000 fffff880`03b84000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`052c8000 fffff880`052e6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000 cdd cdd.dll unavailable (00000000)
fffff880`01200000 fffff880`0122a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d3f000 fffff880`00dff000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00c4c000 fffff880`00c7c000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce1000 fffff880`00d3f000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0155f000 fffff880`015d2000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`10b88000 fffff880`10b98000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`049e2000 fffff880`049f0000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ad2000 fffff880`03b55000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03b55000 fffff880`03b73000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03ac3000 fffff880`03ad2000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`014c0000 fffff880`014d6000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`049ba000 fffff880`049dc000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04800000 fffff880`04809000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`049f0000 fffff880`049fc000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04809000 fffff880`0481c000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0481c000 fffff880`04828000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c0f000 fffff880`03d03000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03d03000 fffff880`03d49000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03dbd000 fffff880`03dca000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00eb4000 fffff880`00ec8000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`04901000 fffff880`0490c000 flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00c00000 fffff880`00c4c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015e3000 fffff880`015ed000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01486000 fffff880`014c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0178c000 fffff880`017d6000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`03df3000 fffff880`03e00000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03610000 fffff800`03659000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03d49000 fffff880`03d6d000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04921000 fffff880`0497d000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04855000 fffff880`0486e000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0486e000 fffff880`04876080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04847000 fffff880`04855000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05200000 fffff880`052c8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01600000 fffff880`01609000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01015000 fffff880`0101d000 intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03baa000 fffff880`03bc0000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`10bd2000 fffff880`10be1000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04877000 fffff880`04885000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba6000 fffff800`00ba9000 kdcom kdcom.dll Fri Jan 21 08:17:13 2011 (4D398759)
fffff880`03a00000 fffff880`03a43000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01545000 fffff880`0155f000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01761000 fffff880`0178c000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`049dc000 fffff880`049e1200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03be3000 fffff880`03bf8000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03bc0000 fffff880`03be3000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c89000 fffff880`00ccd000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0fe90000 fffff880`0fe9e000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`10be1000 fffff880`10bf0000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0488e000 fffff880`0489b000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e5c000 fffff880`00e76000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05371000 fffff880`05389000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05389000 fffff880`053b6000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05afd000 fffff880`05b4b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05b4b000 fffff880`05b6e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02c4e000 fffff880`02c59000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011d9000 fffff880`011e3000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014e7000 fffff880`01545000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03ab8000 fffff880`03ac3000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ee000 fffff880`01800000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0160f000 fffff880`01701000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c00000 fffff880`03c0c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05346000 fffff880`05359000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`0fe00000 fffff880`0fe2f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0490c000 fffff880`04921000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d93000 fffff880`02da2000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c95000 fffff880`02cda000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01701000 fffff880`01761000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02c59000 fffff880`02c6a000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03aac000 fffff880`03ab8000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03659000 fffff800`03c35000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122e000 fffff880`013d1000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04885000 fffff880`0488e000 NuidFltr NuidFltr.sys Fri May 08 04:53:31 2009 (4A03F30B)
fffff880`013ed000 fffff880`013f6000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b30000 fffff880`10b31180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe9e000 fffff880`10b2fe00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`052f3000 fffff880`05346000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d6d000 fffff880`02d93000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03dd6000 fffff880`03df3000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01000000 fffff880`01015000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8c000 fffff880`00fbf000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f0000 fffff880`01200000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015d2000 fffff880`015e3000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05a00000 fffff880`05aa6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0497d000 fffff880`049ba000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ccd000 fffff880`00ce1000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`10bf0000 fffff880`10bfc000 PTSimBus PTSimBus.sys Wed Jun 17 22:20:48 2009 (4A39A480)
fffff880`10bae000 fffff880`10bd2000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0fe2f000 fffff880`0fe4a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0fe4a000 fffff880`0fe6b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0fe6b000 fffff880`0fe85000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a5b000 fffff880`03aac000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0fe85000 fffff880`0fe90000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02c33000 fffff880`02c3c000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c3c000 fffff880`02c45000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02c45000 fffff880`02c4e000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0144c000 fffff880`01486000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05359000 fffff880`05371000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`07c00000 fffff880`07c32000 Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`01153000 fffff880`01182000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05aa6000 fffff880`05ab1000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03dca000 fffff880`03dd6000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02da2000 fffff880`02dbf000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`017e6000 fffff880`017ee000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05b6e000 fffff880`05bdf000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`01024000 fffff880`0114a000 sptd sptd.sys Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`06e6d000 fffff880`06f03000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06e06000 fffff880`06e6d000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05ab1000 fffff880`05ade000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`03c0c000 fffff880`03c0d480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05bdf000 fffff880`05bf1000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02c88000 fffff880`02c95000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c6a000 fffff880`02c88000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dda000 fffff880`02dee000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00530000 fffff960`0053a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03b84000 fffff880`03baa000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03a43000 fffff880`03a55000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04828000 fffff880`04845000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04845000 fffff880`04846f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03dac000 fffff880`03dbd000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`048a7000 fffff880`04901000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`10b32000 fffff880`10b88000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03d9f000 fffff880`03dac000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011e3000 fffff880`011f0000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00ec8000 fffff880`00ed6000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`00fd4000 fffff880`00ff9000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d6000 fffff880`017e6000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fbf000 fffff880`00fd4000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`07de7000 fffff880`07df4000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02dbf000 fffff880`02dda000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02c23000 fffff880`02c33000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ed9000 fffff880`00f7d000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f7d000 fffff880`00f8c000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d64000 fffff880`02d6d000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`0036f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`0114a000 fffff880`01153000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02c00000 fffff880`02c21000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`03d6d000 fffff880`03d9f000 Rt64win7.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00032000
fffff880`014d6000 fffff880`014e4000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`015ed000 fffff880`015f9000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`013d1000 fffff880`013da000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`013da000 fffff880`013ed000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000