*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82ec4a9c, 8ad8bc44, 8ad8b820}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ec4a9c, The address that the exception occurred at
Arg3: 8ad8bc44, Exception Record Address
Arg4: 8ad8b820, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c mov ecx,dword ptr [edi+0Ch]
EXCEPTION_RECORD: 8ad8bc44 -- (.exr 0xffffffff8ad8bc44)
ExceptionAddress: 82ec4a9c (nt!ExpWorkerThread+0x000000fe)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 0000000b
Attempt to read from address 0000000b
CONTEXT: 8ad8b820 -- (.cxr 0xffffffff8ad8b820)
eax=82f823e8 ebx=82f823bc ecx=0006a116 edx=00000000 esi=84e12368 edi=ffffffff
eip=82ec4a9c esp=8ad8bd0c ebp=8ad8bd50 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!ExpWorkerThread+0xfe:
82ec4a9c 8b4f0c mov ecx,dword ptr [edi+0Ch] ds:0023:0000000b=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 0000000b
READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb0848
Unable to read MiSystemVaType memory at 82f8fe20
0000000b
FOLLOWUP_IP:
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c mov ecx,dword ptr [edi+0Ch]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 8304ff64 to 82ec4a9c
STACK_TEXT:
8ad8bd50 8304ff64 00000001 b9d8f92a 00000000 nt!ExpWorkerThread+0xfe
8ad8bd90 82ef8219 82ec499e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x7E_ANALYSIS_INCONCLUSIVE
BUCKET_ID: 0x7E_ANALYSIS_INCONCLUSIVE
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 8313318b, b24fc74c, 0}
*** WARNING: Unable to verify timestamp for kerneld.x32
*** ERROR: Module load completed but symbols could not be loaded for kerneld.x32
Probably caused by : kerneld.x32 ( kerneld+4d0b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8313318b, The address that the exception occurred at
Arg3: b24fc74c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExFreePoolWithTag+6d0
8313318b 8b12 mov edx,dword ptr [edx]
TRAP_FRAME: b24fc74c -- (.trap 0xffffffffb24fc74c)
ErrCode = 00000000
eax=0000047c ebx=20206f49 ecx=00007d90 edx=00007d90 esi=000001ff edi=85338ae0
eip=8313318b esp=b24fc7c0 ebp=b24fc818 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!ExFreePoolWithTag+0x6d0:
8313318b 8b12 mov edx,dword ptr [edx] ds:0023:00007d90=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: aida64.exe
CURRENT_IRQL: 1
IRP_ADDRESS: 01770620
LAST_CONTROL_TRANSFER: from 83093121 to 8313318b
STACK_TEXT:
b24fc818 83093121 85338ae8 00000000 adc3948b nt!ExFreePoolWithTag+0x6d0
b24fc864 8308abbf 01770660 b24fc8ac b24fc8a4 nt!IopCompleteRequest+0xe6
b24fc8b4 b0f42d0b b2ff31d6 87a70250 88904c28 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b24fcbfc 83049593 88904c28 85770620 85770620 kerneld+0x4d0b
b24fcc14 8323c98f 87a70250 85770620 85770690 nt!IofCallDriver+0x63
b24fcc34 8323fb61 88904c28 87a70250 00000000 nt!IopSynchronousServiceTail+0x1f8
b24fccd0 832863fc 88904c28 85770620 00000000 nt!IopXxxControlFile+0x6aa
b24fcd04 830501ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b24fcd04 770870b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0aa6d7b4 00000000 00000000 00000000 00000000 0x770870b4
STACK_COMMAND: kb
FOLLOWUP_IP:
kerneld+4d0b
b0f42d0b ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: kerneld+4d0b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x32
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9f8bf2
FAILURE_BUCKET_ID: 0x8E_kerneld+4d0b
BUCKET_ID: 0x8E_kerneld+4d0b
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82f6b1f0, The address that the exception occurred at
Arg3: b48f674c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExFreePoolWithTag+735
82f6b1f0 f00fc111 lock xadd dword ptr [ecx],edx
TRAP_FRAME: b48f674c -- (.trap 0xffffffffb48f674c)
ErrCode = 00000002
eax=ffffffff ebx=20206f49 ecx=00000007 edx=00000001 esi=000001ff edi=accf5838
eip=82f6b1f0 esp=b48f67c0 ebp=b48f6818 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExFreePoolWithTag+0x735:
82f6b1f0 f00fc111 lock xadd dword ptr [ecx],edx ds:0023:00000007=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: aida64.exe
CURRENT_IRQL: 1
IRP_ADDRESS: 011f14f0
LAST_CONTROL_TRANSFER: from 82ecb121 to 82f6b1f0
STACK_TEXT:
b48f6818 82ecb121 accf5840 00000000 ab2c4b8a nt!ExFreePoolWithTag+0x735
b48f6864 82ec2bbf 011f1530 b48f68ac b48f68a4 nt!IopCompleteRequest+0xe6
b48f68b4 ae57ed0b b4213d1e 87afdf80 87afd3a8 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b48f6bfc 82e81593 87afd3a8 851f14f0 851f14f0 kerneld+0x4d0b
b48f6c14 8307498f 87afdf80 851f14f0 851f1560 nt!IofCallDriver+0x63
b48f6c34 83077b61 87afd3a8 87afdf80 00000000 nt!IopSynchronousServiceTail+0x1f8
b48f6cd0 830be3fc 87afd3a8 851f14f0 00000000 nt!IopXxxControlFile+0x6aa
b48f6d04 82e881ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b48f6d04 778670b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0abcd7b4 00000000 00000000 00000000 00000000 0x778670b4
STACK_COMMAND: kb
FOLLOWUP_IP:
kerneld+4d0b
ae57ed0b ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: kerneld+4d0b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x32
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9f8bf2
FAILURE_BUCKET_ID: 0x8E_kerneld+4d0b
BUCKET_ID: 0x8E_kerneld+4d0b
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 8f0c4a1b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f7d848
Unable to read MiSystemVaType memory at 82f5ce20
ffffffff
FAULTING_IP:
igdkmd32+bca1b
8f0c4a1b 8910 mov dword ptr [eax],edx
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8f05606e to 8f0c4a1b
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
8ad83bd0 8f05606e 8601a000 00070070 8ad83be8 igdkmd32+0xbca1b
8ad83bec 8f29d3e9 8601a000 00070070 8ad83c20 igdkmd32+0x4e06e
8ad83bfc 8f2bd80a 8601a000 00070070 00000000 igdkmd32+0x2953e9
8ad83c20 8f2bd43c 86e35008 c25b19cc 8ad83c40 igdkmd32+0x2b580a
8ad83c54 8f2bc89b 86e35008 8ad83c7c 856ffde8 igdkmd32+0x2b543c
8ad83cc0 8f2bd900 86e35008 00000341 00000000 igdkmd32+0x2b489b
8ad83cd8 8f03f664 8601a000 00000000 856ffde8 igdkmd32+0x2b5900
8ad83cec 83028466 85a70680 850f0e70 84e01918 igdkmd32+0x37664
8ad83d00 82e91aab 856ffde8 00000000 84e01918 nt!IopProcessWorkItem+0x23
8ad83d50 8301cf64 00000001 9559be87 00000000 nt!ExpWorkerThread+0x10d
8ad83d90 82ec5219 82e9199e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
igdkmd32+bca1b
8f0c4a1b 8910 mov dword ptr [eax],edx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: igdkmd32+bca1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: igdkmd32
IMAGE_NAME: igdkmd32.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d746355
FAILURE_BUCKET_ID: 0x50_igdkmd32+bca1b
BUCKET_ID: 0x50_igdkmd32+bca1b
Followup: MachineOwner
---------
start end module name
80bd4000 80bdc000 kdcom kdcom.dll Tue Jul 14 02:08:58 2009 (4A5BDAAA)
81e00000 81e13000 rspndr rspndr.sys Tue Jul 14 00:53:20 2009 (4A5BC8F0)
81f0f000 81f1b000 kbdhid kbdhid.sys Sat Nov 20 09:50:10 2010 (4CE799D2)
81f1b000 81f28000 crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
81f28000 81f33000 dump_pciidex dump_pciidex.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
81f33000 81f3d000 dump_msahci dump_msahci.sys Sat Nov 20 09:50:48 2010 (4CE799F8)
81f3d000 81f4e000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
81f59000 81f74000 luafv luafv.sys Tue Jul 14 00:15:44 2009 (4A5BC020)
81f74000 81fac000 aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
81fac000 81faeb00 aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
81faf000 81fc9000 WudfPf WudfPf.sys Sat Nov 20 09:58:55 2010 (4CE79BDF)
81fc9000 81fd7000 vmnetbridge vmnetbridge.sys Mon Aug 10 13:05:29 2009 (4A800D09)
81fd7000 81fd9f00 VMNET VMNET.SYS Mon Aug 10 13:03:57 2009 (4A800CAD)
81fda000 81fea000 lltdio lltdio.sys Tue Jul 14 00:53:18 2009 (4A5BC8EE)
81fea000 81ffa000 ndisuio ndisuio.sys Sat Nov 20 10:06:36 2010 (4CE79DAC)
82e14000 83226000 nt ntkrpamp.exe Sat Apr 09 04:49:39 2011 (4D9FD753)
83226000 8325d000 hal halmacpi.dll Sat Nov 20 08:37:38 2010 (4CE788D2)
88624000 886a9000 mcupdate mcupdate.dll Sat Nov 20 12:00:54 2010 (4CE7B876)
886a9000 886ba000 PSHED PSHED.dll Tue Jul 14 02:09:36 2009 (4A5BDAD0)
886ba000 886c2000 BOOTVID BOOTVID.dll Tue Jul 14 02:04:34 2009 (4A5BD9A2)
886c2000 88704000 CLFS CLFS.SYS Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88704000 887af000 CI CI.dll Sat Nov 20 12:05:17 2010 (4CE7B97D)
887af000 887d2000 ataport ataport.SYS Sat Nov 20 08:38:00 2010 (4CE788E8)
887d2000 887db000 amdxata amdxata.sys Fri Mar 19 16:19:01 2010 (4BA3A3F5)
88800000 88812000 winhv winhv.sys Sat Nov 20 08:38:15 2010 (4CE788F7)
88812000 8881b000 atapi atapi.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
8881b000 88825000 msahci msahci.sys Sat Nov 20 09:50:48 2010 (4CE799F8)
88825000 88833000 PCIIDEX PCIIDEX.SYS Tue Jul 14 00:11:15 2009 (4A5BBF13)
88833000 888a4000 Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
888a4000 888b2000 WDFLDR WDFLDR.SYS Tue Jul 14 00:11:25 2009 (4A5BBF1D)
888b2000 888fa000 ACPI ACPI.sys Sat Nov 20 08:37:52 2010 (4CE788E0)
888fa000 88903000 WMILIB WMILIB.SYS Tue Jul 14 00:11:22 2009 (4A5BBF1A)
88903000 8890b000 msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
8890b000 88935000 pci pci.sys Sat Nov 20 08:37:57 2010 (4CE788E5)
88935000 88940000 vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
88940000 88951000 partmgr partmgr.sys Sat Nov 20 08:38:14 2010 (4CE788F6)
88951000 88959000 compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
88959000 88964000 BATTC BATTC.SYS Tue Jul 14 00:19:15 2009 (4A5BC0F3)
88964000 88974000 volmgr volmgr.sys Sat Nov 20 08:38:06 2010 (4CE788EE)
88974000 889bf000 volmgrx volmgrx.sys Tue Jul 14 00:11:41 2009 (4A5BBF2D)
889bf000 889d5000 mountmgr mountmgr.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
889d5000 889fe180 vmbus vmbus.sys Sat Nov 20 09:14:58 2010 (4CE79192)
88a00000 88a259c0 VBoxDrv VBoxDrv.sys Tue Apr 26 14:10:29 2011 (4DB6C445)
88a26000 88a37000 termdd termdd.sys Sat Nov 20 10:21:10 2010 (4CE7A116)
88a3a000 88a6e000 fltmgr fltmgr.sys Tue Jul 14 00:11:13 2009 (4A5BBF11)
88a6e000 88a7f000 fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
88a7f000 88bae000 Ntfs Ntfs.sys Fri Mar 11 03:21:11 2011 (4D799527)
88bae000 88bd9000 msrpc msrpc.sys Tue Jul 14 00:11:59 2009 (4A5BBF3F)
88bd9000 88bec000 ksecdd ksecdd.sys Sat Nov 20 08:38:54 2010 (4CE7891E)
88bec000 88bff000 wanarp wanarp.sys Sat Nov 20 10:07:45 2010 (4CE79DF1)
88c00000 88c0ee80 WMDrive WMDrive.sys Sun Aug 22 18:14:17 2010 (4C715AE9)
88c1b000 88c78000 cng cng.sys Tue Jul 14 00:32:55 2009 (4A5BC427)
88c78000 88c86000 pcw pcw.sys Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88c86000 88c8f000 Fs_Rec Fs_Rec.sys Tue Jul 14 00:11:14 2009 (4A5BBF12)
88c8f000 88d46000 ndis ndis.sys Sat Nov 20 08:39:19 2010 (4CE78937)
88d46000 88d84000 NETIO NETIO.SYS Sat Nov 20 08:40:03 2010 (4CE78963)
88d84000 88da9000 ksecpkg ksecpkg.sys Tue Jul 14 00:34:00 2009 (4A5BC468)
88dd1000 88df0000 cdrom cdrom.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
88df0000 88dfe000 netbios netbios.sys Tue Jul 14 00:53:54 2009 (4A5BC912)
88e00000 88e25000 CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
88e26000 88f70000 tcpip tcpip.sys Sat Nov 20 08:41:36 2010 (4CE789C0)
88f70000 88fa1000 fwpkclnt fwpkclnt.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
88fa1000 88fb1000 mup mup.sys Tue Jul 14 00:14:14 2009 (4A5BBFC6)
88fb1000 88fe3000 fvevol fvevol.sys Sat Nov 20 08:40:22 2010 (4CE78976)
88fe3000 88ff4000 disk disk.sys Tue Jul 14 00:11:28 2009 (4A5BBF20)
89000000 8902d000 rdyboost rdyboost.sys Sat Nov 20 09:00:07 2010 (4CE78E17)
8902d000 89035000 hwpolicy hwpolicy.sys Sat Nov 20 08:37:35 2010 (4CE788CF)
89037000 890c8100 timntr timntr.sys Wed Jun 02 13:57:37 2010 (4C065541)
890c9000 890d1380 vmstorfl vmstorfl.sys Sat Nov 20 09:14:37 2010 (4CE7917D)
890d2000 89111000 volsnap volsnap.sys Sat Nov 20 08:38:13 2010 (4CE788F5)
89111000 891c6fa0 tdrpm273 tdrpm273.sys Tue Aug 10 10:56:21 2010 (4C612245)
891c7000 891cf000 spldr spldr.sys Mon May 11 17:13:47 2009 (4A084EBB)
891cf000 891f6f80 snapman snapman.sys Tue Aug 10 11:15:28 2010 (4C6126C0)
8e418000 8e459000 rdbss rdbss.sys Sat Nov 20 08:42:44 2010 (4CE78A04)
8e459000 8e463000 nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
8e463000 8e46d000 mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8e46d000 8e479000 discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8e479000 8e4dd000 csc csc.sys Sat Nov 20 08:44:32 2010 (4CE78A70)
8e4dd000 8e4f5000 dfsc dfsc.sys Sat Nov 20 08:42:32 2010 (4CE789F8)
8e4f5000 8e503000 blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
8e503000 8e54c180 aswSP aswSP.SYS Tue May 10 13:03:43 2011 (4DC9299F)
8e54d000 8e56e000 tunnel tunnel.sys Sat Nov 20 10:06:40 2010 (4CE79DB0)
8e56e000 8e58d000 HDAudBus HDAudBus.sys Sat Nov 20 09:59:28 2010 (4CE79C00)
8e58d000 8e5d3000 nwifi nwifi.sys Tue Jul 14 00:51:59 2009 (4A5BC89F)
8e600000 8e611000 vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
8e611000 8e619dc0 VBoxUSBMon VBoxUSBMon.sys Tue Apr 26 14:10:30 2011 (4DB6C446)
8e61e000 8e68e000 aswSnx aswSnx.SYS Tue May 10 13:03:53 2011 (4DC929A9)
8e68e000 8e695000 Null Null.SYS Tue Jul 14 00:11:12 2009 (4A5BBF10)
8e695000 8e69c000 Beep Beep.SYS Tue Jul 14 00:45:00 2009 (4A5BC6FC)
8e69c000 8e6a8000 vga vga.sys Tue Jul 14 00:25:50 2009 (4A5BC27E)
8e6a8000 8e6c9000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8e6c9000 8e6d6000 watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
8e6d6000 8e6de000 RDPCDD RDPCDD.sys Sat Nov 20 10:22:19 2010 (4CE7A15B)
8e6de000 8e6e6000 rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8e6e6000 8e6ee000 rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8e6ee000 8e6f9000 Msfs Msfs.SYS Tue Jul 14 00:11:26 2009 (4A5BBF1E)
8e6f9000 8e707000 Npfs Npfs.SYS Tue Jul 14 00:11:31 2009 (4A5BBF23)
8e707000 8e71e000 tdx tdx.sys Sat Nov 20 08:39:17 2010 (4CE78935)
8e71e000 8e72a000 TDI TDI.SYS Sat Nov 20 08:39:18 2010 (4CE78936)
8e72a000 8e733f00 aswTdi aswTdi.SYS Tue May 10 13:02:35 2011 (4DC9295B)
8e734000 8e78e000 afd afd.sys Sat Nov 20 08:40:00 2010 (4CE78960)
8e78e000 8e792200 aswRdr aswRdr.SYS Tue May 10 12:59:54 2011 (4DC928BA)
8e793000 8e7c5000 netbt netbt.sys Sat Nov 20 08:39:22 2010 (4CE7893A)
8e7c5000 8e7ce000 ws2ifsl ws2ifsl.sys Tue Jul 14 00:55:01 2009 (4A5BC955)
8e7ce000 8e7d5000 wfplwf wfplwf.sys Tue Jul 14 00:53:51 2009 (4A5BC90F)
8e7d5000 8e7f4000 pacer pacer.sys Tue Jul 14 00:53:58 2009 (4A5BC916)
8f008000 8fa99000 igdkmd32 igdkmd32.sys Mon Mar 07 04:47:17 2011 (4D746355)
8fa99000 8fb50000 dxgkrnl dxgkrnl.sys Sat Nov 20 09:08:14 2010 (4CE78FFE)
8fb50000 8fb89000 dxgmms1 dxgmms1.sys Thu Feb 03 03:45:05 2011 (4D4A24C1)
8fb89000 8fb93080 HECI HECI.sys Thu Sep 17 20:54:12 2009 (4AB293E4)
8fb94000 8fba3000 usbehci usbehci.sys Fri Mar 25 02:57:58 2011 (4D8C04B6)
8fba3000 8fbee000 USBPORT USBPORT.SYS Fri Mar 25 02:58:05 2011 (4D8C04BD)
90218000 904b1000 bcmwl6 bcmwl6.sys Fri Jan 22 03:30:34 2010 (4B591BDA)
904b1000 904bb000 vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
904bb000 904cd000 L1C62x86 L1C62x86.sys Mon Sep 27 07:36:14 2010 (4CA03B5E)
904cd000 904e5000 i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
904e5000 904ff080 keyscrambler keyscrambler.sys Thu Feb 11 15:03:17 2010 (4B741C35)
90500000 9050d000 kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
9050d000 90511600 VMkbd VMkbd.sys Tue Sep 21 09:46:16 2010 (4C9870D8)
90512000 90548980 SynTP SynTP.sys Fri Nov 13 03:39:49 2009 (4AFCD505)
90549000 9054a700 USBD USBD.SYS Fri Mar 25 02:57:53 2011 (4D8C04B1)
9054b000 90558000 mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
90558000 90578580 Impcd Impcd.sys Fri Feb 26 23:31:23 2010 (4B8859CB)
90579000 9058b000 intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
9058b000 90594000 wmiacpi wmiacpi.sys Tue Jul 14 00:19:16 2009 (4A5BC0F4)
90594000 90597700 CmBatt CmBatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
90598000 905dc000 usbhub usbhub.sys Fri Mar 25 02:58:34 2011 (4D8C04DA)
905dc000 905ffc00 usbvideo usbvideo.sys Sat Nov 20 10:00:20 2010 (4CE79C34)
90600000 90611000 NDProxy NDProxy.SYS Sat Nov 20 10:07:39 2010 (4CE79DEB)
90611000 90624000 HIDCLASS HIDCLASS.SYS Sat Nov 20 09:59:37 2010 (4CE79C09)
90624000 9062a480 HIDPARSE HIDPARSE.SYS Tue Jul 14 00:50:59 2009 (4A5BC863)
90633000 906fc000 cfosspeed cfosspeed.sys Tue Feb 10 11:02:05 2009 (49915EAD)
906fc000 90709000 CompositeBus CompositeBus.sys Sat Nov 20 09:50:21 2010 (4CE799DD)
90709000 9071b000 AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
9071b000 90733000 rasl2tp rasl2tp.sys Tue Jul 14 00:54:33 2009 (4A5BC939)
90733000 9073e000 ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
9073e000 90760000 ndiswan ndiswan.sys Sat Nov 20 10:07:48 2010 (4CE79DF4)
90760000 90778000 raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
90778000 9078f000 raspptp raspptp.sys Tue Jul 14 00:54:47 2009 (4A5BC947)
9078f000 907a6000 rassstp rassstp.sys Tue Jul 14 00:54:57 2009 (4A5BC951)
907a6000 907b0000 rdpbus rdpbus.sys Tue Jul 14 01:02:40 2009 (4A5BCB20)
907b0000 907b1380 swenum swenum.sys Tue Jul 14 00:45:08 2009 (4A5BC704)
907b2000 907e6000 ks ks.sys Sat Nov 20 09:50:17 2010 (4CE799D9)
907e6000 907f4000 umbus umbus.sys Sat Nov 20 10:00:23 2010 (4CE79C37)
907f4000 907ff000 mouhid mouhid.sys Tue Jul 14 00:45:08 2009 (4A5BC704)
90c00000 90c0b000 hidusb hidusb.sys Sat Nov 20 09:59:38 2010 (4CE79C0A)
90c0e000 90f4c940 RTKVHDA RTKVHDA.sys Thu Feb 24 10:17:00 2011 (4D66301C)
90f4d000 90f7c000 portcls portcls.sys Tue Jul 14 00:51:00 2009 (4A5BC864)
90f7c000 90f95000 drmk drmk.sys Tue Jul 14 01:36:05 2009 (4A5BD2F5)
90f95000 90fdb000 IntcDAud IntcDAud.sys Fri Oct 15 09:27:18 2010 (4CB81066)
90fdb000 90fe5000 Dxapi Dxapi.sys Tue Jul 14 00:25:25 2009 (4A5BC265)
90fe5000 90ffc000 usbccgp usbccgp.sys Fri Mar 25 02:58:06 2011 (4D8C04BE)
92010000 92019000 TSDDD TSDDD.dll Tue Jul 14 01:01:40 2009 (4A5BCAE4)
92040000 9205e000 cdd cdd.dll Sat Nov 20 11:56:35 2010 (4CE7B773)
921b0000 923fe000 win32k win32k.sys Thu Mar 03 03:42:10 2011 (4D6F0E12)
ad21f000 ad2a4000 HTTP HTTP.sys Sat Nov 20 08:40:17 2010 (4CE78971)
ad2a4000 ad2bd000 bowser bowser.sys Wed Feb 23 04:47:32 2011 (4D649164)
ad2bd000 ad2cf000 mpsdrv mpsdrv.sys Tue Jul 14 00:52:52 2009 (4A5BC8D4)
ad2cf000 ad2f2000 mrxsmb mrxsmb.sys Wed Feb 23 04:47:34 2011 (4D649166)
ad2f2000 ad32d000 mrxsmb10 mrxsmb10.sys Wed Feb 23 04:47:43 2011 (4D64916F)
ad32d000 ad348000 mrxsmb20 mrxsmb20.sys Wed Feb 23 04:47:39 2011 (4D64916B)
ad360000 ad36a000 hcmon hcmon.sys Tue Sep 21 08:55:58 2010 (4C98650E)
ad36a000 ad37ca00 SENTINEL SENTINEL.SYS Thu Sep 26 06:47:32 2002 (3D929F74)
ad37d000 ad38ca00 vmci vmci.sys Tue Sep 21 08:23:00 2010 (4C985D54)
ad407000 ad457000 srv2 srv2.sys Wed Feb 23 04:47:58 2011 (4D64917E)
ad457000 ad4a9000 srv srv.sys Wed Feb 23 04:48:14 2011 (4D64918E)
ad4a9000 ad4cf340 afcdp afcdp.sys Mon Aug 30 13:11:24 2010 (4C7B9FEC)
ad4d0000 ad4d0d00 TuneUpUtilitiesDriver32 TuneUpUtilitiesDriver32.sys Thu Sep 17 12:54:55 2009 (4AB2238F)
ad4d1000 ad4dc000 AIDA64Driver AIDA64Driver.sys Fri Apr 08 23:28:02 2011 (4D9F8BF2)
ad4dc000 ad4e5000 asyncmac asyncmac.sys Tue Jul 14 00:54:46 2009 (4A5BC946)
ad4fb000 ad506000 monitor monitor.sys Tue Jul 14 00:25:58 2009 (4A5BC286)
ad506000 ad50f000 vwifimp vwifimp.sys Tue Jul 14 00:52:09 2009 (4A5BC8A9)
ad515000 ad5ec000 netr28u netr28u.sys Wed May 26 11:21:27 2010 (4BFCF627)
aec00000 aec04c80 vmnetuserif vmnetuserif.sys Tue Sep 21 09:09:44 2010 (4C986848)
aec05000 aec08d80 vstor2_ws60 vstor2-ws60.sys Thu Aug 19 21:28:38 2010 (4C6D93F6)
aec20000 aeceee00 vmx86 vmx86.sys Tue Sep 21 10:33:16 2010 (4C987BDC)
aecef000 aed19000 fastfat fastfat.SYS Tue Jul 14 00:14:01 2009 (4A5BBFB9)
aed19000 aed31000 idmwfp idmwfp.sys Mon Mar 28 18:36:01 2011 (4D90C701)
aed31000 aedc8000 peauth peauth.sys Tue Jul 14 01:35:44 2009 (4A5BD2E0)
aedc8000 aedd2000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
aedd2000 aedf3000 srvnet srvnet.sys Wed Feb 23 04:47:53 2011 (4D649179)
aedf3000 aee00000 tcpipreg tcpipreg.sys Sat Nov 20 10:07:13 2010 (4CE79DD1)
Unloaded modules:
ad50f000 ad515000 vmusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00006000
81e38000 81f0f000 netr28u.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 000D7000
81e13000 81e1c000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
ad4f0000 ad4fb000 monitor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
ad4e5000 ad4f0000 monitor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
81f4e000 81f59000 monitor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
ad38d000 ad3f7000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0006A000
ad348000 ad360000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
8e58d000 8e5bb000 RtsUStor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002E000
88da9000 88db6000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
88ff4000 88fff000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
88db6000 88dc0000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
88dc0000 88dd1000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000