[B]
BugCheck 1000007E, {ffffffffc0000005, fffff80002a9795f, fffff880031cba78, fffff880031cb2e0}
Probably caused by : ntkrnlmp.exe ( nt!KxStartSystemThread+16 )
[/B]
Microsoft (R) Windows Debugger Version 6.12.0002.633...
[B]
BugCheck 1000007E, {ffffffffc0000005, fffff80002a9795f, fffff880031cba78, fffff880031cb2e0}
Probably caused by : ntkrnlmp.exe ( nt!KxStartSystemThread+16 )
[/B]
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\033011-18064-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
Debug session time: Wed Mar 30 19:54:56.227 2011 (UTC - 4:00)
System Uptime: 0 days 4:42:25.991
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002a9795f, fffff880031cba78, fffff880031cb2e0}
Probably caused by : ntkrnlmp.exe ( nt!KxStartSystemThread+16 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a9795f, The address that the exception occurred at
Arg3: fffff880031cba78, Exception Record Address
Arg4: fffff880031cb2e0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpWorkerThread+10f
fffff800`02a9795f ffd3 call rbx
EXCEPTION_RECORD: fffff880031cba78 -- (.exr 0xfffff880031cba78)
ExceptionAddress: fffff80002a9795f (nt!ExpWorkerThread+0x000000000000010f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031cb2e0 -- (.cxr 0xfffff880031cb2e0)
rax=0000000000000001 rbx=b2e0fffff880014d rcx=1b5cfffffa8006a8
rdx=00002b0c00000000 rsi=fffffa8005218040 rdi=1b5cfffffa8006a8
rip=fffff80002a9795f rsp=fffff880031cbcb0 rbp=fffff80002c2f5f8
r8=000000007f215548 r9=0000000000da7a64 r10=00000000000b1aa1
r11=fffffa8006a8b2e0 r12=fffffa8006a8b2e0 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExpWorkerThread+0x10f:
fffff800`02a9795f ffd3 call rbx {b2e0ffff`f880014d}
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc20e0
ffffffffffffffff
FOLLOWUP_IP:
nt!KxStartSystemThread+16
fffff800`02a68c26 48c7c10e000000 mov rcx,0Eh
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002d2d7c6 to fffff80002a9795f
STACK_TEXT:
fffff880`031cbcb0 fffff800`02d2d7c6 : 0000056e`00000000 fffffa80`05218040 00000000`00000080 fffffa80`0518f9e0 : nt!ExpWorkerThread+0x10f
fffff880`031cbd40 fffff800`02a68c26 : fffff880`02f64180 fffffa80`05218040 fffff880`02f6efc0 0000056e`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031cbd80 00000000`00000000 : fffff880`031cc000 fffff880`031c6000 fffff880`031cb9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KxStartSystemThread+16
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880031cb2e0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!KxStartSystemThread+16
BUCKET_ID: X64_0x7E_nt!KxStartSystemThread+16
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\033011-20170-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
Debug session time: Wed Mar 30 15:11:32.444 2011 (UTC - 4:00)
System Uptime: 1 days 23:39:07.834
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ad195f, fffff880031b6a78, fffff880031b62e0}
Probably caused by : ntkrnlmp.exe ( nt!KxStartSystemThread+16 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ad195f, The address that the exception occurred at
Arg3: fffff880031b6a78, Exception Record Address
Arg4: fffff880031b62e0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpWorkerThread+10f
fffff800`02ad195f ffd3 call rbx
EXCEPTION_RECORD: fffff880031b6a78 -- (.exr 0xfffff880031b6a78)
ExceptionAddress: fffff80002ad195f (nt!ExpWorkerThread+0x000000000000010f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031b62e0 -- (.cxr 0xfffff880031b62e0)
rax=0000000000000001 rbx=d2e0fffff8800148 rcx=9c34fffffa8006a6
rdx=0001b3c600000000 rsi=fffffa8005201040 rdi=9c34fffffa8006a6
rip=fffff80002ad195f rsp=fffff880031b6cb0 rbp=fffff80002c695f8
r8=00000000e63c4e20 r9=0000000000da7a64 r10=000000000004ced3
r11=fffffa8006a6d2e0 r12=fffffa8006a6d2e0 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExpWorkerThread+0x10f:
fffff800`02ad195f ffd3 call rbx {d2e0ffff`f8800148}
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfc0e0
ffffffffffffffff
FOLLOWUP_IP:
nt!KxStartSystemThread+16
fffff800`02aa2c26 48c7c10e000000 mov rcx,0Eh
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002d677c6 to fffff80002ad195f
STACK_TEXT:
fffff880`031b6cb0 fffff800`02d677c6 : 00000000`00000000 fffffa80`05201040 00000000`00000080 fffffa80`0518f9e0 : nt!ExpWorkerThread+0x10f
fffff880`031b6d40 fffff800`02aa2c26 : fffff880`02f63180 fffffa80`05201040 fffff880`02f6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031b6d80 00000000`00000000 : fffff880`031b7000 fffff880`031b1000 fffff880`031b69f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KxStartSystemThread+16
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880031b62e0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!KxStartSystemThread+16
BUCKET_ID: X64_0x7E_nt!KxStartSystemThread+16
Followup: MachineOwner
---------
start end module name
fffff880`0493a000 fffff880`04978000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ee6000 fffff880`00f3d000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c33000 fffff880`02cbd000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`051dd000 fffff880`051f3000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`05280000 fffff880`053b2000 agrsm64 agrsm64.sys Tue Jan 26 12:52:20 2010 (4B5F2BD4)
fffff880`01829000 fffff880`01878000 ahcix64s ahcix64s.sys Wed Sep 23 08:52:47 2009 (4ABA1A1F)
fffff880`02de6000 fffff880`02dfb000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00fd4000 fffff880`00fdf000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`081a1000 fffff880`081ac000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`0650c000 fffff880`0652e000 AtiHdmi AtiHdmi.sys Thu Jan 28 20:03:36 2010 (4B6233E8)
fffff880`048b0000 fffff880`048e4000 atikmpag atikmpag.sys Wed Mar 10 17:34:04 2010 (4B981E5C)
fffff880`015f8000 fffff880`01600000 AtiPcie64 AtiPcie64.sys Wed Mar 10 09:33:45 2010 (4B97ADC9)
fffff880`04a34000 fffff880`050a3000 atipmdag atipmdag.sys Wed Mar 10 18:14:05 2010 (4B9827BD)
fffff960`00910000 fffff960`00971000 ATMFD ATMFD.DLL Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`019b8000 fffff880`019bf000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c1e000 fffff880`02c2f000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0557f000 fffff880`0559d000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006e0000 fffff960`00707000 cdd cdd.dll Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`01954000 fffff880`0197e000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d16000 fffff880`00dd6000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00e00000 fffff880`00e30000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cb8000 fffff880`00d16000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01163000 fffff880`011d6000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`053dd000 fffff880`053ed000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`06eec000 fffff880`06efa000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c00000 fffff880`02c1e000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dd7000 fffff880`02de6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`011d6000 fffff880`011ec000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0656b000 fffff880`0658d000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`06f04000 fffff880`06f53000 dump_ahcix64s dump_ahcix64s.sys Wed Sep 23 08:52:47 2009 (4ABA1A1F)
fffff880`06f53000 fffff880`06f66000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06efa000 fffff880`06f04000 dump_storport dump_storport.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`06ee0000 fffff880`06eec000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`050a3000 fffff880`05197000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`05197000 fffff880`051dd000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010f1000 fffff880`01105000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010a5000 fffff880`010f1000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00c5c000 fffff880`00c96000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01000000 fffff880`0104a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a0b000 fffff800`02a54000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04a00000 fffff880`04a24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06f9d000 fffff880`06fb6000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`06fb6000 fffff880`06fbe080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`06f8f000 fffff880`06f9d000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`054b7000 fffff880`0557f000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`014c3000 fffff880`014cc000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04a24000 fffff880`04a33000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06fe9000 fffff880`06ff7000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc8000 fffff800`00bd2000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0484a000 fffff880`0488d000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0658d000 fffff880`06592200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`06c44000 fffff880`06c59000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`053ed000 fffff880`053f4000 lmimirr lmimirr.sys Tue Apr 10 18:32:45 2007 (461C108D)
fffff880`05488000 fffff880`0549b000 LMIRfsDriver LMIRfsDriver.sys Mon Jul 14 12:26:56 2008 (487B7E50)
fffff880`06c00000 fffff880`06c23000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c97000 fffff880`00ca4000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`053b4000 fffff880`053c3000 modem modem.sys Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`06f81000 fffff880`06f8f000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0483b000 fffff880`0484a000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06fdc000 fffff880`06fe9000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fba000 fffff880`00fd4000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0197e000 fffff880`019af000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`05471000 fffff880`05481000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`0559d000 fffff880`055b5000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`055b5000 fffff880`055e2000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05400000 fffff880`0544e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0544e000 fffff880`05471000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01235000 fffff880`01240000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f46000 fffff880`00f50000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01105000 fffff880`01163000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dcc000 fffff880`02dd7000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`014b1000 fffff880`014c3000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014cc000 fffff880`015be000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`053f4000 fffff880`05400000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0499c000 fffff880`049cb000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`064f7000 fffff880`0650c000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d31000 fffff880`02d40000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cbd000 fffff880`02d02000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`08067000 fffff880`0807c000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`013ec000 fffff880`013fd000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dc0000 fffff880`02dcc000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a54000 fffff800`03031000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01249000 fffff880`013ec000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019af000 fffff880`019b8000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d0b000 fffff880`02d31000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f90000 fffff880`00fa5000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f50000 fffff880`00f83000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`080b1000 fffff880`08157000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0652e000 fffff880`0656b000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca4000 fffff880`00cb8000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`05481000 fffff880`05488000 RaInfo RaInfo.sys Fri Jan 04 13:57:14 2008 (477E818A)
fffff880`04978000 fffff880`0499c000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`049cb000 fffff880`049e6000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04800000 fffff880`04821000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04821000 fffff880`0483b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d6f000 fffff880`02dc0000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01810000 fffff880`01819000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01819000 fffff880`01822000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f2000 fffff880`019fb000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015be000 fffff880`015f8000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06c59000 fffff880`06c71000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05200000 fffff880`05265000 Rt64win7 Rt64win7.sys Mon Oct 25 05:33:07 2010 (4CC54ED3)
fffff880`06cb5000 fffff880`06edf100 RTKVHD64 RTKVHD64.sys Thu Feb 25 04:14:31 2010 (4B863F77)
fffff880`08157000 fffff880`08162000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`014a9000 fffff880`014b1000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06400000 fffff880`06496000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08000000 fffff880`08067000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`08162000 fffff880`0818f000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`01878000 fffff880`018da000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`0527d000 fffff880`0527e480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0818f000 fffff880`081a1000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011ec000 fffff880`011f9000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`00fdf000 fffff880`00ffd000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d5b000 fffff880`02d6f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00dd6000 fffff880`00dfc000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0488d000 fffff880`0489f000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0148b000 fffff880`014a9000 US40fs64 US40fs64.sys Fri Mar 05 08:03:05 2010 (4B910109)
fffff880`06fbf000 fffff880`06fdc000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`053b2000 fffff880`053b3f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`053c3000 fffff880`053d4000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`05270000 fffff880`0527d000 usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
fffff880`0649d000 fffff880`064f7000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`05265000 fffff880`05270000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`048e4000 fffff880`0493a000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`06c82000 fffff880`06c8e000 usbprint usbprint.sys Mon Jul 13 20:38:18 2009 (4A5BD37A)
fffff880`06c71000 fffff880`06c82000 usbscan usbscan.sys Mon Jul 13 20:35:32 2009 (4A5BD2D4)
fffff880`06f66000 fffff880`06f81000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f83000 fffff880`00f90000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`019bf000 fffff880`019cd000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019cd000 fffff880`019f2000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa5000 fffff880`00fba000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0104a000 fffff880`01096000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d40000 fffff880`02d5b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01800000 fffff880`01810000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e33000 fffff880`00ed7000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed7000 fffff880`00ee6000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d02000 fffff880`02d0b000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00320000 win32k win32k.sys Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`053d4000 fffff880`053dd000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f3d000 fffff880`00f46000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06c23000 fffff880`06c44000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`0807c000 fffff880`080ad000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`018da000 fffff880`0194b000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`018da000 fffff880`018e8000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018e8000 fffff880`018f2000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`018f2000 fffff880`01941000 dump_ahcix64
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0004F000
fffff880`01941000 fffff880`01954000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000