Proszę bardzo
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
Przeważnie z winy sterownika urządzenia.
Tutaj niestety nie widzę informacji na stosie jaki sterownik został zapisany w instrukcji KiBugCheckDriver.
W tym wypadki zostaje grzebanie po stosie i patrzenie na wskaźniki instrukcji.
O razu uprzedzam przed informacją probaby caused - wskazuje na plik jądra systemowego z obsługą procesorów wielordzeniowych. Nie jest on przyczyną.
Być może coś się wyklaruje jak puścisz weryfikację sterowników - opis poszukaj na forum wpisując frazę "verifier".
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e4c6d0
Debug session time: Mon Nov 11 10: 34: 08.223 2013 (UTC + 1: 00)
System Uptime: 0 days 0: 55: 53.987
Loading Kernel Symbols
...............................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {fffff880031fd768, 8000000073060963, fffff80000b9cae0, 2}
Probably caused by : ntkrnlmp.exe ( nt! ? : FNODOBFM: `string'+44dfc )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff880031fd768, Virtual address for the attempted execute.
Arg2: 8000000073060963, PTE contents.
Arg3: fffff80000b9cae0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff80000b9cae0 -- (.trap 0xfffff80000b9cae0)
.trap 0xfffff80000b9cae0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000138633c791 rbx=0000000000000000 rcx=000000138633c6dc
rdx=00000000000000b5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880031fd768 rsp=fffff80000b9cc70 rbp=0000000000000000
r8=000000008633c6dc r9=00000000017d7840 r10=0000000000132752
r11=0000000000041a37 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
fffff880`031fd768 0000 add byte ptr [rax],al ds: 00000013`8633c791=?
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cfc8b8 to fffff80002c7ebc0
STACK_TEXT:
fffff800`00b9c978 fffff800`02cfc8b8 : 00000000`000000fc fffff880`031fd768 80000000`73060963 fffff800`00b9cae0 : nt!KeBugCheckEx
fffff800`00b9c980 fffff800`02c7ccee : 00000000`00000008 fffff880`031fd768 fffff800`02c7b100 00000000`00000000 : nt! ? : FNODOBFM: `string'+0x44dfc
fffff800`00b9cae0 fffff880`031fd768 : 00000013`8633c6dc 00000000`00000246 fffff800`00b9cc98 00000000`00000018 : nt!KiPageFault+0x16e
fffff800`00b9cc70 00000013`8633c6dc : 00000000`00000246 fffff800`00b9cc98 00000000`00000018 00000000`00000001 : 0xfffff880`031fd768
fffff800`00b9cc78 00000000`00000246 : fffff800`00b9cc98 00000000`00000018 00000000`00000001 fffff800`02c87786 : 0x13`8633c6dc
fffff800`00b9cc80 fffff800`00b9cc98 : 00000000`00000018 00000000`00000001 fffff800`02c87786 00000000`00000000 : 0x246
fffff800`00b9cc88 00000000`00000018 : 00000000`00000001 fffff800`02c87786 00000000`00000000 00000000`00000000 : 0xfffff800`00b9cc98
fffff800`00b9cc90 00000000`00000001 : fffff800`02c87786 00000000`00000000 00000000`00000000 4fcad23f`e1e2f5e7 : 0x18
fffff800`00b9cc98 fffff800`02c87786 : 00000000`00000000 00000000`00000000 4fcad23f`e1e2f5e7 a5f5034e`1a07aea0 : 0x1
fffff800`00b9cca0 fffff800`02c7689c : fffff800`02df9e80 fffff800`00000000 00000000`00000000 fffff880`06c0652c : nt!PoIdle+0x5a7
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ? : FNODOBFM: `string'+44dfc
fffff800`02cfc8b8 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ? : FNODOBFM: `string'+44dfc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
FAILURE_BUCKET_ID: X64_0xFC_nt!_??_: FNODOBFM: _string_+44dfc
BUCKET_ID: X64_0xFC_nt!_??_: FNODOBFM: _string_+44dfc
Followup: MachineOwner
---------
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
start end module name
fffff880`00f1a000 fffff880`00f71000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`010e3000 fffff880`010ee000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`00e2a000 fffff880`00e33000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00c5c000 fffff880`00c86000 ataport ataport.SYS Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff880`00d24000 fffff880`00de4000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`0194e000 fffff880`0197e000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00cc6000 fffff880`00d24000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`014f7000 fffff880`01569000 cng cng.sys Sat Jun 02 05: 25: 51 2012 (4FC987BF)
fffff880`01938000 fffff880`0194e000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`0113a000 fffff880`0114e000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`010ee000 fffff880`0113a000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`0157a000 fffff880`01584000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`018fe000 fffff880`01938000 fvevol fvevol.sys Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`011ac000 fffff880`011f5000 fwpkclnt fwpkclnt.sys Thu Jan 03 04: 06: 48 2013 (50E4F5C8)
fffff800`031ee000 fffff800`03237000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`018f5000 fffff880`018fe000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff800`00bcd000 fffff800`00bd7000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff880`013d2000 fffff880`013ed000 ksecdd ksecdd.sys Sat Jun 02 04: 50: 23 2012 (4FC97F6F)
fffff880`01200000 fffff880`0122a000 ksecpkg ksecpkg.sys Sat Jun 02 05: 27: 11 2012 (4FC9880F)
fffff880`00ca5000 fffff880`00cb2000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00e10000 fffff880`00e2a000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`00f7a000 fffff880`00f84000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`0114e000 fffff880`011ac000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`018e3000 fffff880`018f5000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01400000 fffff880`014f2000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`01584000 fffff880`015e4000 NETIO NETIO.SYS Wed Aug 22 17: 11: 28 2012 (5034F6A0)
fffff800`02c09000 fffff800`031ee000 nt ntkrnlmp.exe Thu Aug 29 03: 13: 25 2013 (521EA035)
fffff880`01230000 fffff880`013d2000 Ntfs Ntfs.sys Fri Apr 12 13: 54: 36 2013 (5167F5FC)
fffff880`01055000 fffff880`01080000 nvstor nvstor.sys Fri Mar 19 21: 45: 11 2010 (4BA3E257)
fffff880`00fc4000 fffff880`00fd9000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00f84000 fffff880`00fb7000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00fee000 fffff880`00ff5000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00e00000 fffff880`00e10000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`01569000 fffff880`0157a000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`00cb2000 fffff880`00cc6000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`018a9000 fffff880`018e3000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`018a1000 fffff880`018a9000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01080000 fffff880`010e3000 storport storport.sys Fri Mar 11 05: 30: 23 2011 (4D79A55F)
fffff880`01600000 fffff880`017ff000 tcpip tcpip.sys Sun Sep 08 03: 11: 52 2013 (522BCED8)
fffff880`0187e000 fffff880`018a1000 Tpkd Tpkd.sys Wed Dec 23 20: 32: 16 2009 (4B327040)
1020c587`29a30000 1020c587`8ea30010 Unknown_Module_1020c587_29a30000 Unknown_Module_1020c587`29a30000 unavailable (00000000)
fffff880`00fb7000 fffff880`00fc4000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00fd9000 fffff880`00fee000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys unavailable (00000000)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`00e48000 fffff880`00f0a000 Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00f0a000 fffff880`00f1a000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00f71000 fffff880`00f7a000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
Drugi
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`02c0e000 PsLoadedModuleList = 0xfffff800`02e516d0
Debug session time: Mon Nov 11 11: 16: 14.125 2013 (UTC + 1: 00)
System Uptime: 0 days 0: 40: 27.889
Loading Kernel Symbols
...............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88003202768, 8, fffff88003202768, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ? : FNODOBFM: `string'+4518f )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88003202768, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff88003202768, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebb100
fffff88003202768
FAULTING_IP:
+3af2faf0008d814
fffff880`03202768 ? ?
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002f1bae0 -- (.trap 0xfffff88002f1bae0)
.trap 0xfffff88002f1bae0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000e2235864c rbx=0000000000000000 rcx=0000000e22358597
rdx=00000000000000b5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003202768 rsp=fffff88002f1bc70 rbp=0000000000000000
r8=0000000022358597 r9=00000000017d7840 r10=0000000000016a2f
r11=fffffa80069b9c58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
fffff880`03202768 ? ?
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d01bf0 to fffff80002c83bc0
STACK_TEXT:
fffff880`02f1b978 fffff800`02d01bf0 : 00000000`00000050 fffff880`03202768 00000000`00000008 fffff880`02f1bae0 : nt!KeBugCheckEx
fffff880`02f1b980 fffff800`02c81cee : 00000000`00000008 fffff880`03202768 fffff800`02c8ef00 00000000`00000000 : nt! ? : FNODOBFM: `string'+0x4518f
fffff880`02f1bae0 fffff880`03202768 : 0000000e`22358597 00000000`00000246 fffff880`02f1bc98 00000000`00000018 : nt!KiPageFault+0x16e
fffff880`02f1bc70 0000000e`22358597 : 00000000`00000246 fffff880`02f1bc98 00000000`00000018 00000000`00000001 : 0xfffff880`03202768
fffff880`02f1bc78 00000000`00000246 : fffff880`02f1bc98 00000000`00000018 00000000`00000001 fffff800`02c8c786 : 0xe`22358597
fffff880`02f1bc80 fffff880`02f1bc98 : 00000000`00000018 00000000`00000001 fffff800`02c8c786 00000000`ffffffed : 0x246
fffff880`02f1bc88 00000000`00000018 : 00000000`00000001 fffff800`02c8c786 00000000`ffffffed 00000000`00000000 : 0xfffff880`02f1bc98
fffff880`02f1bc90 00000000`00000001 : fffff800`02c8c786 00000000`ffffffed 00000000`00000000 fffff880`009f0f40 : 0x18
fffff880`02f1bc98 fffff800`02c8c786 : 00000000`ffffffed 00000000`00000000 fffff880`009f0f40 00000000`00000001 : 0x1
fffff880`02f1bca0 fffff800`02c7b89c : fffff880`009e6180 fffff880`00000000 00000000`00000000 fffff880`073fa8ec : nt!PoIdle+0x5a7
fffff880`02f1bd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ? : FNODOBFM: `string'+4518f
fffff800`02d01bf0 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ? : FNODOBFM: `string'+4518f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
FAILURE_BUCKET_ID: X64_0x50_nt!_??_: FNODOBFM: _string_+4518f
BUCKET_ID: X64_0x50_nt!_??_: FNODOBFM: _string_+4518f
Followup: MachineOwner
---------
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
start end module name
fffff880`00fa3000 fffff880`00ffa000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`01142000 fffff880`0114d000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`00eae000 fffff880`00eb7000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00dc6000 fffff880`00df0000 ataport ataport.SYS Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff880`00caa000 fffff880`00d6a000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`01974000 fffff880`019a4000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00c4c000 fffff880`00caa000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`0105e000 fffff880`010d0000 cng cng.sys Sat Jun 02 05: 25: 51 2012 (4FC987BF)
fffff880`0195e000 fffff880`01974000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01199000 fffff880`011ad000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`0114d000 fffff880`01199000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01924000 fffff880`0195e000 fvevol fvevol.sys Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`015a6000 fffff880`015ef000 fwpkclnt fwpkclnt.sys Thu Jan 03 04: 06: 48 2013 (50E4F5C8)
fffff800`031f3000 fffff800`0323c000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`0191b000 fffff880`01924000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff800`00ba6000 fffff800`00bb0000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff880`013d0000 fffff880`013eb000 ksecdd ksecdd.sys Sat Jun 02 04: 50: 23 2012 (4FC97F6F)
fffff880`01460000 fffff880`0148a000 ksecpkg ksecpkg.sys Sat Jun 02 05: 27: 11 2012 (4FC9880F)
fffff880`00c2b000 fffff880`00c38000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00e94000 fffff880`00eae000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`00e09000 fffff880`00e13000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`01909000 fffff880`0191b000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`014b4000 fffff880`015a6000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Wed Aug 22 17: 11: 28 2012 (5034F6A0)
fffff800`02c0e000 fffff800`031f3000 nt ntkrnlmp.exe Thu Aug 29 03: 13: 25 2013 (521EA035)
fffff880`0122e000 fffff880`013d0000 Ntfs Ntfs.sys Fri Apr 12 13: 54: 36 2013 (5167F5FC)
fffff880`00c00000 fffff880`00c2b000 nvstor nvstor.sys Fri Mar 19 21: 45: 11 2010 (4BA3E257)
fffff880`00e53000 fffff880`00e68000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00e13000 fffff880`00e46000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00e7d000 fffff880`00e84000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00e84000 fffff880`00e94000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`013eb000 fffff880`013fc000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`00c38000 fffff880`00c4c000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`018cf000 fffff880`01909000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`015ef000 fffff880`015f7000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`010df000 fffff880`01142000 storport storport.sys Fri Mar 11 05: 30: 23 2011 (4D79A55F)
fffff880`01601000 fffff880`01800000 tcpip tcpip.sys Sun Sep 08 03: 11: 52 2013 (522BCED8)
fffff880`0148a000 fffff880`014ad000 Tpkd Tpkd.sys Wed Dec 23 20: 32: 16 2009 (4B327040)
fff4f4f4`fff4f4f4 fff4f4f5`ffe9e9e8 Unknown_Module_fff4f4f4_fff4f4f4 Unknown_Module_fff4f4f4`fff4f4f4 unavailable (00000000)
fffff880`00e46000 fffff880`00e53000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00e68000 fffff880`00e7d000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00d6a000 fffff880`00dc6000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`011ad000 fffff880`011f9000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`00ed1000 fffff880`00f93000 Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00f93000 fffff880`00fa3000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00e00000 fffff880`00e09000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
Unloaded modules:
fffff880`019a4000 fffff880`019b2000 Unknown_Module_fffff880`019a4000
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`019b2000 fffff880`019bc000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`019bc000 fffff880`019e7000 Unknown_Module_fffff880`019bc000
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
fffff880`019e7000 fffff880`019fa000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000