Now what?
Test results:
Tried one by one / different slot / also different combinations of 2.
All tests passes (10+ passes per combination).
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031911-34367-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_00000000`00000001, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
Debug session time: Sat Mar 19 09:35:59.424 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:35.454
Unable to load image Unknown_Module_00000000`00000001, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {f6, 148, fffffa8007a54b30, fffff88007b191e0}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 0000000000000148, Handle value being referenced.
Arg3: fffffa8007a54b30, Address of the current process.
Arg4: fffff88007b191e0, Address inside the driver that is performing the incorrect reference.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
BUGCHECK_STR: 0xc4_f6
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002a9124a to fffff88003f909c2
STACK_TEXT:
fffff800`00b9cc98 fffff800`02a9124a : 00000000`0027d3e2 fffffa80`073758d8 00000000`00000000 00000000`00000000 : 0xfffff880`03f909c2
fffff800`00b9cca0 00000000`0027d3e2 : fffffa80`073758d8 00000000`00000000 00000000`00000000 fffff800`02bfde80 : 0xfffff800`02a9124a
fffff800`00b9cca8 fffffa80`073758d8 : 00000000`00000000 00000000`00000000 fffff800`02bfde80 fffff800`02a8ecb7 : 0x27d3e2
fffff800`00b9ccb0 00000000`00000000 : 00000000`00000000 fffff800`02bfde80 fffff800`02a8ecb7 00000000`183d965b : 0xfffffa80`073758d8
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
You'll be crashing non-stop for as long as the verifier is on. Disable it by typing in the command prompt: -> Verifier /reset.
032611-24367-01.dmp
BugCheck 1E, {ffffffffc0000005, fffff80002ae0b7f, 0, ffffffffffffffff}
Stack text:
nt!KiPageFault
nt!MmAccessFault
nt!MiResolveDemandZeroFault
nt!MiRemoveAnyPage
nt!MiReplenishPageSlist
....
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-24367-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a4b000 PsLoadedModuleList = 0xfffff800`02c88e50
Debug session time: Sat Mar 26 12:20:59.420 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:15.451
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002ae0b7f, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ae0b7f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiReplenishPageSlist+100
fffff800`02ae0b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf30e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88007867618 -- (.exr 0xfffff88007867618)
ExceptionAddress: fffff80002ae0b7f (nt!MiReplenishPageSlist+0x0000000000000100)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880078676c0 -- (.trap 0xfffff880078676c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000041000008839b rbx=0000000000000000 rcx=fdffffffffffffff
rdx=000000000000004b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae0b7f rsp=fffff88007867850 rbp=fffffa8005400438
r8=fffff80002cf5400 r9=fffffa8005400000 r10=fffffa8005400458
r11=fffff880078678a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiReplenishPageSlist+0x100:
fffff800`02ae0b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:2354:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002af5a39 to fffff80002abb740
STACK_TEXT:
fffff880`07866e48 fffff800`02af5a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02ae0b7f 00000000`00000000 : nt!KeBugCheckEx
fffff880`07866e50 fffff800`02abad82 : fffff880`07867618 000c2a80`0198ad10 fffff880`078676c0 00000000`00000008 : nt!KiDispatchException+0x1b9
fffff880`078674e0 fffff800`02ab968a : fffffa80`059a4140 00000000`00001000 00000000`00000000 00000000`00001000 : nt!KiExceptionDispatch+0xc2
fffff880`078676c0 fffff800`02ae0b7f : fffff880`07867848 00000000`00000000 00000000`00000000 fffff6fb`80008590 : nt!KiGeneralProtectionFault+0x10a
fffff880`07867850 fffff800`02ae10af : fffff800`02cf5400 00000000`0000001b fffffa80`01999d10 fffffa80`01998510 : nt!MiReplenishPageSlist+0x100
fffff880`078678b0 fffff800`02ad92c7 : 00000000`00000002 fffff880`00000002 fffffa80`07f35ec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`078679d0 fffff800`02ad59c6 : 00000000`00000001 00000000`0ca5c000 fffff880`07867c20 fffff680`000652e0 : nt!MiResolveDemandZeroFault+0x577
fffff880`07867ac0 fffff800`02ab982e : 00000000`00000001 00000000`00000000 00000000`03b2e301 00000000`00000001 : nt!MmAccessFault+0x5c6
fffff880`07867c20 00000000`68b37037 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0449f750 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x68b37037
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+100
fffff800`02ae0b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiReplenishPageSlist+100
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+100
BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+100
Followup: MachineOwner
---------
start end module name
fffff880`04856000 fffff880`04894000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f93000 fffff880`00fea000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0183c000 fffff880`018c6000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04894000 fffff880`048aa000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c2a000 fffff880`00c35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`042de000 fffff880`042e6000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0751b000 fffff880`07526000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00dee000 fffff880`00df7000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`048e0000 fffff880`051dc000 atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03d76000 fffff880`03dc4000 atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff960`008e0000 fffff960`00941000 ATMFD ATMFD.DLL Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`01989000 fffff880`01990000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d29000 fffff880`03d3a000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03fba000 fffff880`03fd8000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00600000 fffff960`00627000 cdd cdd.dll Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`00d14000 fffff880`00dd4000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018f0000 fffff880`01920000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cb6000 fffff880`00d14000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01144000 fffff880`011b7000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043f0000 fffff880`04400000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0574e000 fffff880`0575c000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c88000 fffff880`03d0b000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d0b000 fffff880`03d29000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`00c35000 fffff880`00c4b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05726000 fffff880`05748000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05768000 fffff880`05771000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0575c000 fffff880`05768000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05771000 fffff880`05784000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05784000 fffff880`05790000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042fc000 fffff880`043f0000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04200000 fffff880`04246000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010d2000 fffff880`010e6000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01086000 fffff880`010d2000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011b7000 fffff880`011f1000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a02000 fffff800`02a4b000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04246000 fffff880`0426a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0568d000 fffff880`056e9000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`057bd000 fffff880`057d6000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`057d6000 fffff880`057de080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`057af000 fffff880`057bd000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03ef2000 fffff880`03fba000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`014ed000 fffff880`014f6000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03d60000 fffff880`03d76000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03c3b000 fffff880`03c4a000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`057df000 fffff880`057ed000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bca000 fffff800`00bd4000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`02c77000 fffff880`02cba000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05748000 fffff880`0574d200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03c6b000 fffff880`03c80000 LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`01920000 fffff880`01935000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02db6000 fffff880`02dca000 LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`02dca000 fffff880`02ded000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c5e000 fffff880`00ca2000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`057ed000 fffff880`057fb000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03c4a000 fffff880`03c59000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03df3000 fffff880`03e00000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dd4000 fffff880`00dee000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03fd8000 fffff880`03ff0000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03e00000 fffff880`03e2d000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03e2d000 fffff880`03e7b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03e7b000 fffff880`03e9e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019ee000 fffff880`019f9000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ff3000 fffff880`00ffd000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010e6000 fffff880`01144000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01235000 fffff880`01247000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014fe000 fffff880`015f0000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`042ef000 fffff880`042fb000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03dc4000 fffff880`03df3000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05678000 fffff880`0568d000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d37000 fffff880`02d46000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cc3000 fffff880`02d08000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a4b000 fffff800`03028000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0124b000 fffff880`013ee000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01980000 fffff880`01989000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d11000 fffff880`02d37000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ec6000 fffff880`00ecd000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ecd000 fffff880`00edd000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06e2b000 fffff880`06ed1000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`056e9000 fffff880`05726000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca2000 fffff880`00cb6000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`048aa000 fffff880`048ce000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`051dc000 fffff880`051f7000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03c00000 fffff880`03c21000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03c21000 fffff880`03c3b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`048ce000 fffff880`048d9000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019d3000 fffff880`019dc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019dc000 fffff880`019e5000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e5000 fffff880`019ee000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01935000 fffff880`0194d000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04856000 Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06ed1000 fffff880`06edc000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`014e5000 fffff880`014ed000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`074aa000 fffff880`0751b000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`07414000 fffff880`074aa000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06f1b000 fffff880`06f82000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06edc000 fffff880`06f09000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`048d9000 fffff880`048da480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06f09000 fffff880`06f1b000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182f000 fffff880`0183c000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01811000 fffff880`0182f000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02da2000 fffff880`02db6000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`02d61000 fffff880`02da2000 truecrypt truecrypt.sys Sun Sep 05 10:23:16 2010 (4C83A7D4)
fffff960`004a0000 fffff960`004aa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`03d3a000 fffff880`03d60000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03c59000 fffff880`03c6b000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05790000 fffff880`057ad000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`057ad000 fffff880`057aef00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`042cd000 fffff880`042de000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0561e000 fffff880`05678000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04277000 fffff880`042cd000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05600000 fffff880`0561b000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0426a000 fffff880`04277000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01990000 fffff880`0199e000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0199e000 fffff880`019c3000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`014d5000 fffff880`014e5000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d46000 fffff880`02d61000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019c3000 fffff880`019d3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee0000 fffff880`00f84000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f84000 fffff880`00f93000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d08000 fffff880`02d11000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00310000 win32k win32k.sys Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`07526000 fffff880`07537000 WinUsb WinUsb.sys Mon Jul 13 20:06:28 2009 (4A5BCC04)
fffff880`042e6000 fffff880`042ef000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fea000 fffff880`00ff3000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`018c6000 fffff880`018e7000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`07537000 fffff880`07568000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`01920000 fffff880`0192e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0192e000 fffff880`0193a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0193a000 fffff880`01943000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01943000 fffff880`01956000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`01956000 fffff880`01980000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002A000
#0000001A,
#00000034,
#00000050,
#0000003B
Probably caused by : fileinfo.sys ( fileinfo!FIStreamGetInfo+11f )
Probably caused by : dxgkrnl.sys ( dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>DoublyLinkedList<DMMVIDPNSOURCEMODE>+c0 )
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6a8 )
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Probably caused by : memory_corruption
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Probably caused by : Ntfs.sys ( Ntfs! ?? ::NNGAKEGL::`string'+3690 )
Probably caused by : memory_corruption ( nt!MiRemoveLowestPriorityStandbyPage+24b )
022811-47283-01.dmp
BugCheck 34, {50830, fffff88003346488, fffff88003345cf0, fffff80002a9acd8}
CACHE_MANAGER (34)
PROCESS_NAME: System
Srack: nt
EXCEPTION_RECORD: fffff88003346488 -- (.exr 0xfffff88003346488)
ExceptionAddress: fffff80002a9acd8 (nt!MiUnlinkPageFromLockedList+0x00000000000006a8)
ExceptionCode: c0000005 (Access violation)
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
ffffffffffffffff
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6a8 )
022811-29078-01.dmp
BugCheck 50, {fffffa7fcc554b60, 1, fffff88004377d8b, 7}
PAGE_FAULT_IN_NONPAGED_AREA (50)
PROCESS_NAME: System
Srack: nt
Probably caused by : memory_corruption
031511-17893-01.dmp
BugCheck 1E, {ffffffffc0000005, fffff80002aaad18, 0, ffffffffffffffff}
KMODE_EXCEPTION_NOT_HANDLED (1e)
PROCESS_NAME: svchost.exe
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+2a2 )
031511-18626-01.dmp
BugCheck 3B, {c0000005, fffff80002ad4e1e, fffff880094b2850, 0}
SYSTEM_SERVICE_EXCEPTION (3b)
PROCESS_NAME: chrome.exe
Probably caused by : memory_corruption ( nt!MiDeletePteList+18e )