Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120710-21746-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4f000 PsLoadedModuleList = 0xfffff800`02e8ce50
Debug session time: Tue Dec 7 18:08:29.837 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:33.336
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa8005167010, fffff88003cc8fb8, 0, d}
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmpag.sys ( atikmpag+6fb8 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8005167010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003cc8fb8, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 000000000000000d, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
atikmpag+6fb8
fffff880`03cc8fb8 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`0366d9c8 fffff880`048f9ef8 : 00000000`00000116 fffffa80`05167010 fffff880`03cc8fb8 00000000`00000000 : nt!KeBugCheckEx
fffff880`0366d9d0 fffff880`048f9c7f : fffff880`03cc8fb8 fffffa80`05167010 fffffa80`03c07950 fffffa80`03eb2410 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`0366da10 fffff880`049a0f07 : fffffa80`05167010 00000000`00000000 fffffa80`03c07950 fffffa80`03eb2410 : dxgkrnl!TdrIsRecoveryRequired+0x21f
fffff880`0366da40 fffff880`049cab75 : 00000000`ffffffff 00000000`000016cb 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`0366db20 fffff880`049c92bb : 00000000`00000102 00000000`00000001 00000000`000016cb 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`0366db50 fffff880`0499c2c6 : ffffffff`ff676980 fffffa80`03eb2410 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`0366dbf0 fffff880`049c8e7a : 00000000`00000000 fffffa80`03fc05a0 00000000`00000080 fffffa80`03eb2410 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`0366dd00 fffff800`02f63c06 : 00000000`fffffc32 fffffa80`03f67b60 fffffa80`018c5040 fffffa80`03f67b60 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`0366dd40 fffff800`02c9dc26 : fffff880`009e9180 fffffa80`03f67b60 fffffa80`0311a670 65652b4d`467a7339 : nt!PspSystemThreadStartup+0x5a
fffff880`0366dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+6fb8
fffff880`03cc8fb8 4883ec28 sub rsp,28h
SYMBOL_NAME: atikmpag+6fb8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78aff
FAILURE_BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120710-30435-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec 7 17:59:17.465 2010 (UTC - 5:00)
System Uptime: 0 days 0:07:10.964
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002c8e0d6, fffff880031ea8d8, fffff880031ea140}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+c6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c8e0d6, The address that the exception occurred at
Arg3: fffff880031ea8d8, Exception Record Address
Arg4: fffff880031ea140, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8
EXCEPTION_RECORD: fffff880031ea8d8 -- (.exr 0xfffff880031ea8d8)
ExceptionAddress: fffff80002c8e0d6 (nt!KiInsertTimerTable+0x00000000000000c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031ea140 -- (.cxr 0xfffff880031ea140)
rax=fefffa8001a869a8 rbx=fffffa8003207100 rcx=00000001650e4fe7
rdx=fffffa8001a393a0 rsi=00000000000006e0 rdi=fffff80002dfbe80
rip=fffff80002c8e0d6 rsp=fffff880031eab10 rbp=fffffa8003d5cb40
r8=fffffa8003207120 r9=0000000000000027 r10=fffff80002dfbe80
r11=fffffa8003207300 r12=fffff80002dfe768 r13=0000000000000001
r14=0000000000000000 r15=000000026680acb8
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010212
nt!KiInsertTimerTable+0xc6:
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8 ds:002b:fefffa80`01a869b0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
ffffffffffffffff
FOLLOWUP_IP:
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002c88af2 to fffff80002c8e0d6
STACK_TEXT:
fffff880`031eab10 fffff800`02c88af2 : fffffa80`03207040 fffffa80`03207040 fffffa80`00000000 00000000`00000000 : nt!KiInsertTimerTable+0xc6
fffff880`031eab70 fffff800`02c8c2a1 : 00000000`00000002 fffffa80`04f9c340 00000000`00000027 00000000`00000000 : nt!KiCommitThreadWait+0x332
fffff880`031eac00 fffff800`02c8e939 : fffff800`02e26500 fffff880`01012560 fffffa80`01b614d8 00000000`00000002 : nt!KeRemoveQueueEx+0x301
fffff880`031eacb0 fffff800`02f25c06 : 00000000`0371b527 fffffa80`03207040 00000000`00000080 fffffa80`018df9e0 : nt!ExpWorkerThread+0xe9
fffff880`031ead40 fffff800`02c5fc26 : fffff800`02dfbe80 fffffa80`03207040 fffff800`02e09c40 fffff880`0124c534 : nt!PspSystemThreadStartup+0x5a
fffff880`031ead80 00000000`00000000 : fffff880`031eb000 fffff880`031e5000 fffff880`031ea9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiInsertTimerTable+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880031ea140 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!KiInsertTimerTable+c6
BUCKET_ID: X64_0x7E_nt!KiInsertTimerTable+c6
Followup: MachineOwner
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c8e0d6, The address that the exception occurred at
Arg3: fffff880031ea8d8, Exception Record Address
Arg4: fffff880031ea140, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8
EXCEPTION_RECORD: fffff880031ea8d8 -- (.exr 0xfffff880031ea8d8)
ExceptionAddress: fffff80002c8e0d6 (nt!KiInsertTimerTable+0x00000000000000c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031ea140 -- (.cxr 0xfffff880031ea140)
rax=fefffa8001a869a8 rbx=fffffa8003207100 rcx=00000001650e4fe7
rdx=fffffa8001a393a0 rsi=00000000000006e0 rdi=fffff80002dfbe80
rip=fffff80002c8e0d6 rsp=fffff880031eab10 rbp=fffffa8003d5cb40
r8=fffffa8003207120 r9=0000000000000027 r10=fffff80002dfbe80
r11=fffffa8003207300 r12=fffff80002dfe768 r13=0000000000000001
r14=0000000000000000 r15=000000026680acb8
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010212
nt!KiInsertTimerTable+0xc6:
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8 ds:002b:fefffa80`01a869b0=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
FOLLOWUP_IP:
nt!KiInsertTimerTable+c6
fffff800`02c8e0d6 4c894008 mov qword ptr [rax+8],r8
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002c88af2 to fffff80002c8e0d6
STACK_TEXT:
fffff880`031eab10 fffff800`02c88af2 : fffffa80`03207040 fffffa80`03207040 fffffa80`00000000 00000000`00000000 : nt!KiInsertTimerTable+0xc6
fffff880`031eab70 fffff800`02c8c2a1 : 00000000`00000002 fffffa80`04f9c340 00000000`00000027 00000000`00000000 : nt!KiCommitThreadWait+0x332
fffff880`031eac00 fffff800`02c8e939 : fffff800`02e26500 fffff880`01012560 fffffa80`01b614d8 00000000`00000002 : nt!KeRemoveQueueEx+0x301
fffff880`031eacb0 fffff800`02f25c06 : 00000000`0371b527 fffffa80`03207040 00000000`00000080 fffffa80`018df9e0 : nt!ExpWorkerThread+0xe9
fffff880`031ead40 fffff800`02c5fc26 : fffff800`02dfbe80 fffffa80`03207040 fffff800`02e09c40 fffff880`0124c534 : nt!PspSystemThreadStartup+0x5a
fffff880`031ead80 00000000`00000000 : fffff880`031eb000 fffff880`031e5000 fffff880`031ea9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiInsertTimerTable+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880031ea140 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!KiInsertTimerTable+c6
BUCKET_ID: X64_0x7E_nt!KiInsertTimerTable+c6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120710-28095-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02e9ce50
Debug session time: Tue Dec 7 00:52:07.130 2010 (UTC - 5:00)
System Uptime: 0 days 0:18:50.628
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cab42a, fffff88005b0bda0, 0}
Probably caused by : ntkrnlmp.exe ( nt!AlpcpQueueIoCompletionPort+20a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cab42a, Address of the instruction which caused the bugcheck
Arg3: fffff88005b0bda0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!AlpcpQueueIoCompletionPort+20a
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0
CONTEXT: fffff88005b0bda0 -- (.cxr 0xfffff88005b0bda0)
rax=fffffa800412c3b0 rbx=fffffa800412c3b0 rcx=0000000000000001
rdx=fffffa8001dde988 rsi=fffff80002e49e80 rdi=fffffa80040c9820
rip=fffff80002cab42a rsp=fffff88005b0c770 rbp=0000000000000000
r8=fffffa8003bf9168 r9=0000000000000000 r10=0000000600000001
r11=0000000000000000 r12=fffffa800412c3b8 r13=fffffa8001dde880
r14=fefff880009e9180 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!AlpcpQueueIoCompletionPort+0x20a:
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0 ds:002b:fefff880`009ed610=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: avgwdsvc.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002cab42a
STACK_TEXT:
fffff880`05b0c770 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpQueueIoCompletionPort+0x20a
FOLLOWUP_IP:
nt!AlpcpQueueIoCompletionPort+20a
fffff800`02cab42a f0490fbaae9044000000 lock bts qword ptr [r14+4490h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!AlpcpQueueIoCompletionPort+20a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88005b0bda0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!AlpcpQueueIoCompletionPort+20a
BUCKET_ID: X64_0x3B_nt!AlpcpQueueIoCompletionPort+20a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120710-18595-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e92e50
Debug session time: Tue Dec 7 19:29:36.105 2010 (UTC - 5:00)
System Uptime: 0 days 0:18:51.603
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {28, 2, 0, fffff80002d07518}
Probably caused by : memory_corruption ( nt!MiFindNodeOrParent+0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d07518, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efd0e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiFindNodeOrParent+0
fffff800`02d07518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88004cc6400 -- (.trap 0xfffff88004cc6400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d07518 rsp=fffff88004cc6598 rbp=0000000000000000
r8=fffff88004cc65e0 r9=0000000000000000 r10=fffffa800434e010
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiFindNodeOrParent:
fffff800`02d07518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h ds:f000:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc4ca9 to fffff80002cc5740
STACK_TEXT:
fffff880`04cc62b8 fffff800`02cc4ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`04cc62c0 fffff800`02cc3920 : fffffa80`04d8b3f8 fffffa80`0434e058 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`04cc6400 fffff800`02d07518 : fffff800`02d0b2d7 00000000`000007ff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`04cc6598 fffff800`02d0b2d7 : 00000000`000007ff 00000000`00000000 00000000`00000000 00001f80`00000000 : nt!MiFindNodeOrParent
fffff880`04cc65a0 fffff800`02d0b25d : fffff8a0`00a25b90 00000000`00000000 fffff880`04cc67c0 00000000`00000001 : nt!MiLocateAddressInTree+0x17
fffff880`04cc65d0 fffff800`02d0b368 : 00000000`00000002 fffffa80`0434e0c8 00000000`0000003c fffffa80`0434e0c8 : nt!MiGetSharedProtosAtDpcLevel+0xbd
fffff880`04cc6620 fffff800`02c631cb : 000067ee`6947dfb1 00000000`00000000 00000000`00000000 fffff800`02ce8139 : nt!MiGetSharedProtos+0x18
fffff880`04cc6650 fffff800`02d77c4b : 00000000`00008529 02000000`0001a321 00000000`000018c0 fffff800`02f8c35b : nt! ?? ::FNODOBFM::`string'+0x927b
fffff880`04cc6680 fffff800`02d787cb : 00000000`00000000 00000000`00000004 fffffa80`01befc28 fffffa80`01bef000 : nt!MiIdentifyPfn+0x39b
fffff880`04cc6720 fffff800`030d7595 : fffffa80`01bef000 fffff880`04cc6ca0 fffff880`04cc67f8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`04cc6760 fffff800`0301c8b8 : 00000000`00000006 00000000`00000000 fffffa80`01bef000 fffff800`02c55001 : nt!PfpPfnPrioRequest+0x115
fffff880`04cc67b0 fffff800`02fc33c3 : 00000000`00000000 fffff800`02c55000 ffffffff`ffffffff fffffa80`00ebbe01 : nt! ?? ::NNGAKEGL::`string'+0x472ad
fffff880`04cc6840 fffff800`02fc41e5 : 00000000`0164b780 fffffa80`0196bcc0 00000000`0164b7e0 0a000000`00000000 : nt!ExpQuerySystemInformation+0x11c2
fffff880`04cc6be0 fffff800`02cc4993 : 00000000`00000001 00000000`052d8d78 80000000`00000001 00000000`00000001 : nt!NtQuerySystemInformation+0x4d
fffff880`04cc6c20 00000000`773e00ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0164b6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e00ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiFindNodeOrParent+0
fffff800`02d07518 48f7412800ffffff test qword ptr [rcx+28h],0FFFFFFFFFFFFFF00h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiFindNodeOrParent+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
BUCKET_ID: X64_0xA_nt!MiFindNodeOrParent+0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\120710-24944-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5c000 PsLoadedModuleList = 0xfffff800`02e99e50
Debug session time: Tue Dec 7 19:37:17.274 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:57.773
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880085dd0c8, fffff880085dc930, fffff80002cd7950}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+92 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880085dd0c8
Arg3: fffff880085dc930
Arg4: fffff80002cd7950
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880085dd0c8 -- (.exr 0xfffff880085dd0c8)
ExceptionAddress: fffff80002cd7950 (nt!ObFastReferenceObject+0x0000000000000010)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880085dc930 -- (.cxr 0xfffff880085dc930)
rax=0000000000000000 rbx=0000000000000001 rcx=fefffa8001d96740
rdx=fffff8a003692bd8 rsi=fefffa8001d96700 rdi=fefffa8001d96740
rip=fffff80002cd7950 rsp=fffff880085dd300 rbp=fefffa8001d96740
r8=fffffa8001d96780 r9=fffffa8001d96780 r10=fffffa80018afe40
r11=fffff880085dd540 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffffa8001d96780
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObFastReferenceObject+0x10:
fffff800`02cd7950 4c8b01 mov r8,qword ptr [rcx] ds:002b:fefffa80`01d96740=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f040e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFlushUserStream+92
fffff880`0110a642 389c24a0000000 cmp byte ptr [rsp+0A0h],bl
FAULTING_IP:
nt!ObFastReferenceObject+10
fffff800`02cd7950 4c8b01 mov r8,qword ptr [rcx]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80002cb9fd1 to fffff80002cd7950
STACK_TEXT:
fffff880`085dd300 fffff800`02cb9fd1 : 00000000`00000000 00000000`00000001 fffffa80`00000000 fffff8a0`0000000f : nt!ObFastReferenceObject+0x10
fffff880`085dd330 fffff800`02cb8954 : fffff8a0`036929e0 fffff8a0`03692be0 fffffa80`01d96780 fffffa80`01d96780 : nt!MiFlushSectionInternal+0xa1
fffff880`085dd570 fffff800`02cb84fa : 00000000`00000000 fffff980`1ab1ba00 00000000`00000000 fffff880`010f3961 : nt!MmFlushSection+0x1f4
fffff880`085dd630 fffff880`0110a642 : fffffa80`022c4958 00000000`00000000 fffff8a0`00000000 00000000`00000001 : nt!CcFlushCache+0x88a
fffff880`085dd730 fffff880`010b99e7 : 00000000`00000000 fffff8a0`085a1c70 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0x92
fffff880`085dd7b0 fffff880`0110abbd : fffffa80`03c95010 fffffa80`0275b180 00000000`00000001 0000000f`ffffff00 : Ntfs!NtfsFlushVolume+0x2c7
fffff880`085dd8e0 fffff880`0110b5f0 : fffffa80`03c95010 fffffa80`01af68c0 fffffa80`03c18f20 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`085dd9c0 fffff880`00c3823f : fffffa80`01af6c60 fffffa80`01af68c0 fffffa80`03c95010 fffff880`085dd9e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`085dda30 fffff880`00c366df : fffffa80`0274a950 00000000`00000000 fffffa80`0274a900 fffffa80`01af68c0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`085ddac0 fffff800`02fe2ca9 : 00000000`00000002 fffffa80`03c18f20 00000000`00000000 fffffa80`01af68c0 : fltmgr!FltpDispatch+0xcf
fffff880`085ddb20 fffff800`02f6f331 : fffffa80`01af68c0 fffffa80`01cfe6b0 fffffa80`03c18f20 00000000`000007ff : nt!IopSynchronousServiceTail+0xf9
fffff880`085ddb90 fffff800`02ccb993 : fffffa80`01cfe6b0 00000000`ffdd2270 fffffa80`0274a950 fffffa80`03c18f20 : nt!NtFlushBuffersFile+0x171
fffff880`085ddc20 00000000`77b4020a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0111f1a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b4020a
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsFlushUserStream+92
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff880085dc930 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+92
BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+92
fffff880`049a5000 fffff880`049e3000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f55000 fffff880`00fac000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03964000 fffff880`039ee000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04b4f000 fffff880`04b65000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`02bd5000 fffff880`02bea000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04af5000 fffff880`04afd000 ASACPI ASACPI.sys Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`02ba9000 fffff880`02baf000 AsIO AsIO.sys Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`02ba3000 fffff880`02ba9000 AsUpIO AsUpIO.sys Sun Jul 05 22:21:38 2009 (4A515FB2)
fffff880`082cc000 fffff880`082d7000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00de1000 fffff880`00dea000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0470d000 fffff880`0472d000 AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0)
fffff880`03c09000 fffff880`043fe000 atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1)
fffff880`02a00000 fffff880`02a4b000 atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF)
fffff880`015f8000 fffff880`01600000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`03873000 fffff880`0387a000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02b92000 fffff880`02ba3000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`032e7000 fffff880`03305000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006c0000 fffff960`006e7000 cdd cdd.dll unavailable (00000000)
fffff880`03813000 fffff880`0383d000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d07000 fffff880`00dc7000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca9000 fffff880`00d07000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01326000 fffff880`01399000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04b3f000 fffff880`04b4f000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04c0c000 fffff880`04c1a000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04c42000 fffff880`04c44f00 dadder dadder.sys Mon Apr 19 05:04:42 2010 (4BCC1CAA)
fffff880`02b74000 fffff880`02b92000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02b65000 fffff880`02b74000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01274000 fffff880`0128a000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0476a000 fffff880`0478c000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04c26000 fffff880`04c2f000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c1a000 fffff880`04c26000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`04c2f000 fffff880`04c42000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04c00000 fffff880`04c0c000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04847000 fffff880`0493b000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0493b000 fffff880`04981000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00dea000 fffff880`00dfe000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c35000 fffff880`00c81000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013aa000 fffff880`013b4000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0123a000 fffff880`01274000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04acb000 fffff880`04ad8000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02c13000 fffff800`02c5c000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04981000 fffff880`049a5000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04a1c000 fffff880`04a35000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04a35000 fffff880`04a3d080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04792000 fffff880`047a0000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0321f000 fffff880`032e7000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015ef000 fffff880`015f8000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04afd000 fffff880`04b1b000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04b1b000 fffff880`04b2a000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`046ff000 fffff880`0470d000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcf000 fffff800`00bd9000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0462e000 fffff880`04671000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`0130c000 fffff880`01326000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015b2000 fffff880`015dd000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0478c000 fffff880`04791200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`04600000 fffff880`04615000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`047ae000 fffff880`047d1000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c88000 fffff880`00c95000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`047a0000 fffff880`047ae000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04a3e000 fffff880`04a4d000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`046f2000 fffff880`046ff000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dc7000 fffff880`00de1000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0383d000 fffff880`0386a000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`033bb000 fffff880`033cb000 MpNWMon MpNWMon.sys Sat Mar 20 01:58:00 2010 (4BA463E8)
fffff880`03305000 fffff880`0331d000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0331d000 fffff880`0334a000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0334a000 fffff880`03398000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03398000 fffff880`033bb000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`038d8000 fffff880`038e3000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fb5000 fffff880`00fbf000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`012ae000 fffff880`0130c000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02b5a000 fffff880`02b65000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015dd000 fffff880`015ef000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01460000 fffff880`01552000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04b89000 fffff880`04b95000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04b95000 fffff880`04bc4000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`046dd000 fffff880`046f2000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02aa2000 fffff880`02ab1000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`0391f000 fffff880`03964000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01552000 fffff880`015b2000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`038e3000 fffff880`038f4000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02b4e000 fffff880`02b5a000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c5c000 fffff800`03238000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0103f000 fffff880`011e2000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0386a000 fffff880`03873000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02a7c000 fffff880`02aa2000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04ad8000 fffff880`04af5000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00e00000 fffff880`00e15000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fbf000 fffff880`00ff2000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e86000 fffff880`00e8d000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e8d000 fffff880`00e9d000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01399000 fffff880`013aa000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05013000 fffff880`050b9000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0472d000 fffff880`0476a000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c95000 fffff880`00ca9000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04b65000 fffff880`04b89000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04bc4000 fffff880`04bdf000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04bdf000 fffff880`04c00000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04a00000 fffff880`04a1a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02afd000 fffff880`02b4e000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`038bd000 fffff880`038c6000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`038c6000 fffff880`038cf000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`038cf000 fffff880`038d8000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01200000 fffff880`0123a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`04615000 fffff880`0462d000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`0483f000 Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`047f2000 fffff880`047fe000 RtNdPt60 RtNdPt60.sys Mon Dec 10 21:49:52 2007 (475DFAD0)
fffff880`050b9000 fffff880`050c4000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04b2a000 fffff880`04b36000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02ab1000 fffff880`02ace000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0825b000 fffff880`082cc000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`0516a000 fffff880`05200000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05103000 fffff880`0516a000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`050c4000 fffff880`050f1000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04a4d000 fffff880`04a4e480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`050f1000 fffff880`05103000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03912000 fffff880`0391f000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`038f4000 fffff880`03912000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02ae9000 fffff880`02afd000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02baf000 fffff880`02bd5000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04671000 fffff880`04683000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04c45000 fffff880`04c46f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04aba000 fffff880`04acb000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04683000 fffff880`046dd000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`049e3000 fffff880`049ee000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04a64000 fffff880`04aba000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00ff2000 fffff880`00fff000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0387a000 fffff880`03888000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04a1a000 fffff880`04a1bd80 vHidDev vHidDev.sys Mon Dec 21 08:49:58 2009 (4B2F7D06)
fffff880`04c51000 fffff880`04dff000 viahduaa viahduaa.sys Mon Jan 11 05:05:18 2010 (4B4AF7DE)
fffff880`03888000 fffff880`038ad000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e15000 fffff880`00e2a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`013b4000 fffff880`01400000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02ace000 fffff880`02ae9000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`038ad000 fffff880`038bd000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea2000 fffff880`00f46000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f46000 fffff880`00f55000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`039ee000 fffff880`039f7000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`0037f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`04b36000 fffff880`04b3f000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fac000 fffff880`00fb5000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`047d1000 fffff880`047f2000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`033cb000 fffff880`033fc000 AODDriver.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`01452000 fffff880`01460000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0128a000 fffff880`01296000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01296000 fffff880`0129f000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`011e2000 fffff880`011f5000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000