PFN_LIST_CORRUPT
Set your memory 667Mhz 6-5-5-15 1.8v.
Attach the crash dumps ffrom C:\Windows\Minidump.
032711-18049-01.dmp
BugCheck 4E, {99, 1f1f2, 2, 1b4f1}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
032611-19593-01.dmp
BugCheck 4E, {99, 2e967, 0, 2ea67}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
032411-29608-01.dmp
BugCheck 4E, {99, 1863f5, 1, 185cf5}
Probably caused by : udfs.sys ( udfs!UdfFlushVolume+964 )
032611-20451-01.dmp
BugCheck 4E, {99, 2f3b2, 0, 118bb2}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
032711-30092-01.dmp
BugCheck 4E, {2, 728e9, 22ffff, 2000}
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-18049-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03259e50
Debug session time: Sun Mar 27 02:56:09.426 2011 (UTC - 4:00)
System Uptime: 0 days 4:48:51.971
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 1f1f2, 2, 1b4f1}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000001f1f2, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000001b4f1, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: bitRipper.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000311c38c to fffff8000308c740
STACK_TEXT:
fffff880`0b5da2e8 fffff800`0311c38c : 00000000`0000004e 00000000`00000099 00000000`0001f1f2 00000000`00000002 : nt!KeBugCheckEx
fffff880`0b5da2f0 fffff800`030e94d2 : 00000000`00000002 00000000`00000000 fffffa80`004ed980 fffff800`032435f8 : nt!MiBadShareCount+0x4c
fffff880`0b5da330 fffff800`0314d2ad : fffffa80`004ed980 fffff880`0b5da480 00000000`00000080 00000000`0019ca32 : nt! ?? ::FNODOBFM::`string'+0x11aa2
fffff880`0b5da390 fffff800`0304141e : 00000000`00000000 fffff880`0b5da480 ffffffff`ffffffff 00000000`00000210 : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`0b5da410 fffff800`030b86ce : fffff980`0e7fc000 00000000`0c054532 fffff880`00000000 00000000`00001000 : nt! ?? ::FNODOBFM::`string'+0x44ef3
fffff880`0b5da600 fffff800`030b8434 : fffffa80`0c34ce10 00000000`0c054532 fffff880`0b5da740 00000000`000303e8 : nt!CcMapAndCopyInToCache+0x20e
fffff880`0b5da6f0 fffff880`012c7fb8 : 00000001`18f703e8 fffffa80`0c385800 fffff880`0b5da7e0 fffffa80`000388d2 : nt!CcCopyWrite+0x194
fffff880`0b5da780 fffff880`010f1132 : fffffa80`0c3858b0 fffff880`010f4732 fffffa80`000388d2 00000000`00038801 : Ntfs!NtfsCopyWriteA+0x208
fffff880`0b5da970 fffff880`010f4c2a : fffff880`0b5daa40 fffffa80`0727b878 00000000`0c050000 00000000`00038800 : fltmgr!FltpPerformFastIoCall+0xf2
fffff880`0b5da9d0 fffff880`011127fe : 00000000`000388d2 00000000`00000000 fffffa80`0c3858b0 fffff880`0b5dab40 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0b5daa10 fffff800`033a164e : fffffa80`0c385924 fffffa80`0c3858b0 00000000`00000000 fffffa80`0c385924 : fltmgr!FltpFastIoWrite+0x1ce
fffff880`0b5daab0 fffff800`0308b993 : 00000000`75262401 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x5ad
fffff880`0b5dabb0 00000000`75262dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02d2f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75262dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0311c38c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-19593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03059000 PsLoadedModuleList = 0xfffff800`03296e50
Debug session time: Sat Mar 26 22:05:51.657 2011 (UTC - 4:00)
System Uptime: 0 days 4:37:38.203
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 2e967, 0, 2ea67}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000002e967, page frame number
Arg3: 0000000000000000, current page state
Arg4: 000000000002ea67, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000315938c to fffff800030c9740
STACK_TEXT:
fffff880`0c6b3f98 fffff800`0315938c : 00000000`0000004e 00000000`00000099 00000000`0002e967 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c6b3fa0 fffff800`0313b9f7 : 00000000`00000000 fffff680`0005ab78 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0c6b3fe0 fffff800`0309dc13 : fffffa80`06da1b30 fffff700`0001fa56 0000007f`fffffff8 fffff8a0`0aa0e3f8 : nt! ?? ::FNODOBFM::`string'+0x3223e
fffff880`0c6b4070 fffff800`0309c67a : fffffa80`06da1b30 fffffa80`00000000 fffff880`0001ec08 fffff800`00000005 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`0c6b4920 fffff800`033acabf : fffff8a0`09b539a0 fffff880`0c6b4c20 00000000`00000000 fffffa80`06ef3b60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`0c6b4970 fffff800`03386735 : 00000000`c0000005 00000000`c0000001 00000000`7ef14000 fffffa80`0ca33530 : nt!PspExitThread+0x92f
fffff880`0c6b4a30 fffff800`030a61cb : 00000000`00000100 fffffa80`06ef3c20 00000000`00000001 fffff800`030d0b9d : nt!PsExitSpecialApc+0x1d
fffff880`0c6b4a60 fffff800`030a6610 : 00000000`00000000 fffff880`0c6b4ae0 fffff800`0338684c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0c6b4ae0 fffff800`030c8a37 : fffffa80`06ef3b60 00000000`0000184c fffff880`0c6b4bf8 fffffa80`0be071e0 : nt!KiInitiateUserApc+0x70
fffff880`0c6b4c20 00000000`75412dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`2069ef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75412dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0315938c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032411-29608-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0300c000 PsLoadedModuleList = 0xfffff800`03249e50
Debug session time: Thu Mar 24 04:16:34.944 2011 (UTC - 4:00)
System Uptime: 1 days 12:10:31.129
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 1863f5, 1, 185cf5}
Probably caused by : udfs.sys ( udfs!UdfFlushVolume+964 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001863f5, page frame number
Arg3: 0000000000000001, current page state
Arg4: 0000000000185cf5, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000310c38c to fffff8000307c740
STACK_TEXT:
fffff880`0316f7b8 fffff800`0310c38c : 00000000`0000004e 00000000`00000099 00000000`001863f5 00000000`00000001 : nt!KeBugCheckEx
fffff880`0316f7c0 fffff800`030213d7 : 00000000`001863f5 00000000`00032392 fffffa80`0096ab60 00000580`00000000 : nt!MiBadShareCount+0x4c
fffff880`0316f800 fffff800`03061b82 : 00000000`00000000 fffff8a0`16d5a000 00000000`00000000 fffff8a0`16cfe200 : nt! ?? ::FNODOBFM::`string'+0x2d244
fffff880`0316f8f0 fffff880`064aa814 : fffffa80`0a877348 00000000`00000000 fffffa80`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`0316f960 fffff880`064bc99e : fffffa80`06fde7e0 fffffa80`0a5be5a0 fffff800`03221500 00000000`00000001 : udfs!UdfFlushVolume+0x964
fffff880`0316fa00 fffff880`06481096 : fffffa80`06fde7e0 fffffa80`06e4ae10 fffffa80`06e4af28 fffffa80`06e4ae10 : udfs!UdfCommonShutdown+0xc2
fffff880`0316faa0 fffff880`010b26af : fffffa80`0aa58db0 fffffa80`06e4ae10 fffff800`03281210 fffffa80`06e4ae10 : udfs!UdfFsdDispatch+0x356
fffff880`0316fb10 fffff800`032cb1cc : fffffa80`0aa59060 fffff800`0322be00 00000000`00000001 00000000`00000000 : fltmgr!FltpDispatch+0x9f
fffff880`0316fb70 fffff800`032cb362 : 00000000`00000001 00000000`00000001 fffff800`032215a0 00000000`00000000 : nt!IopShutdownBaseFileSystems+0xac
fffff880`0316fbf0 fffff800`032cc046 : fffff800`032cbe60 fffff800`032215a0 00000000`00000001 fffff880`01280050 : nt!IoShutdownSystem+0x122
fffff880`0316fc70 fffff800`03089961 : fffff800`032cbe60 fffff880`012a6230 fffffa80`06a32601 fffffa80`00000004 : nt!PopGracefulShutdown+0x1e6
fffff880`0316fcb0 fffff800`0331f7c6 : 00000000`00000000 fffffa80`06a32680 00000000`00000080 fffffa80`06a0b040 : nt!ExpWorkerThread+0x111
fffff880`0316fd40 fffff800`0305ac26 : fffff880`030a4180 fffffa80`06a32680 fffff880`030af040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0316fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
udfs!UdfFlushVolume+964
fffff880`064aa814 3ac3 cmp al,bl
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: udfs!UdfFlushVolume+964
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: udfs
IMAGE_NAME: udfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc1f9
FAILURE_BUCKET_ID: X64_0x4E_99_udfs!UdfFlushVolume+964
BUCKET_ID: X64_0x4E_99_udfs!UdfFlushVolume+964
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-20451-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Sat Mar 26 17:26:48.656 2011 (UTC - 4:00)
System Uptime: 0 days 13:24:58.217
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 2f3b2, 0, 118bb2}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000002f3b2, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000118bb2, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000310238c to fffff80003072740
STACK_TEXT:
fffff880`0c6b91d8 fffff800`0310238c : 00000000`0000004e 00000000`00000099 00000000`0002f3b2 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c6b91e0 fffff800`030e4ce2 : 00000000`00000000 fffffa80`049f8480 0000000f`ffffffff 00000000`00000000 : nt!MiBadShareCount+0x4c
fffff880`0c6b9220 fffff800`030b8ac1 : ad200001`00000000 fffff680`00014f80 00000000`00000200 000fffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x3252e
fffff880`0c6b92a0 fffff800`030b3dee : 00000000`00000002 fffff880`00000000 fffffa80`08014060 fffffa80`080143f8 : nt!MiDecommitPages+0x1a1
fffff880`0c6b9b30 fffff800`03071993 : ffffffff`ffffffff 00000000`028ddd88 00000000`028ddd80 00000000`00000001 : nt!NtFreeVirtualMemory+0x2de
fffff880`0c6b9c20 00000000`76fbf89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028ddcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fbf89a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0310238c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-30092-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`03253e50
Debug session time: Sun Mar 27 03:03:11.200 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:48.745
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {2, 728e9, 22ffff, 2000}
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000000728e9, entry in list being removed
Arg3: 000000000022ffff, highest physical page number
Arg4: 0000000000002000, reference count of entry being removed
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800030a76be to fffff80003086740
STACK_TEXT:
fffff880`031fbab8 fffff800`030a76be : 00000000`0000004e 00000000`00000002 00000000`000728e9 00000000`0022ffff : nt!KeBugCheckEx
fffff880`031fbac0 fffff800`030bcc40 : 00000000`00000001 fffff800`00000000 00000000`00000000 fffffa80`00000053 : nt!MiUnlinkPageFromLockedList+0x8e
fffff880`031fbb50 fffff800`030bda6c : 00000000`00000000 fffffa80`090d7a40 fffffa80`090d7ad8 00000000`00000005 : nt!MiGatherMappedPages+0x108
fffff880`031fbc50 fffff800`033297c6 : fffffa80`06a51040 00000000`00000080 fffffa80`06a28040 c781f123`f38bfe03 : nt!MiMappedPageWriter+0x198
fffff880`031fbd40 fffff800`03064c26 : fffff880`030a4180 fffffa80`06a51040 fffff880`030af040 23ce03e8`0b05c6c1 : nt!PspSystemThreadStartup+0x5a
fffff880`031fbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+8e
fffff800`030a76be cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+8e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
BUCKET_ID: X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
Followup: MachineOwner
---------
start end module name
fffff880`00f24000 fffff880`00f7b000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`040ed000 fffff880`04177000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`053a8000 fffff880`053be000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04226000 fffff880`0423b000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01070000 fffff880`0107b000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`043f1000 fffff880`043f9000 AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
fffff880`069d4000 fffff880`069dd000 aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
fffff880`0699a000 fffff880`069d4000 aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
fffff880`04177000 fffff880`04181000 aswRdr aswRdr.SYS Thu Jan 13 03:37:32 2011 (4D2EB9CC)
fffff880`043a8000 fffff880`043f1000 aswSP aswSP.SYS Thu Jan 13 03:41:42 2011 (4D2EBAC6)
fffff880`013dd000 fffff880`013ed000 aswTdi aswTdi.SYS Thu Jan 13 03:40:19 2011 (4D2EBA73)
fffff880`00e63000 fffff880`00e6c000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dbb000 fffff880`00de5000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`068b1000 fffff880`068d1000 AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04a27000 fffff880`0525e000 atikmdag atikmdag.sys Tue Jan 04 21:48:52 2011 (4D23DC14)
fffff880`048b3000 fffff880`04900000 atikmpag atikmpag.sys Tue Jan 04 21:19:38 2011 (4D23D53A)
fffff960`00930000 fffff960`00991000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`019f3000 fffff880`019fa000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04397000 fffff880`043a8000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`087cf000 fffff880`087ed000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`08a67000 fffff880`08a77000 BthEnum BthEnum.sys Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`05eb8000 fffff880`05ed8000 bthpan bthpan.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`05e00000 fffff880`05e8c000 bthport bthport.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06453000 fffff880`0646b000 BTHUSB BTHUSB.sys Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff960`006c0000 fffff960`006e7000 cdd cdd.dll unavailable (00000000)
fffff880`019c0000 fffff880`019ea000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cd1000 fffff880`00d91000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0193a000 fffff880`0196a000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c73000 fffff880`00cd1000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01139000 fffff880`011ac000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`05398000 fffff880`053a8000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`09313000 fffff880`0931c000 cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`065e8000 fffff880`065f6000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`042f6000 fffff880`04379000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`05fb7000 fffff880`05fec000 CT20XUT CT20XUT.SYS Wed May 05 09:01:28 2010 (4BE16C28)
fffff880`05eee000 fffff880`05f9c000 ctac32k ctac32k.sys Wed Jul 02 04:38:22 2008 (486B3E7E)
fffff880`044cd000 fffff880`04572700 ctaud2k ctaud2k.sys Wed May 05 08:59:48 2010 (4BE16BC4)
fffff880`06476000 fffff880`065d3000 CTEXFIFX CTEXFIFX.SYS Wed May 05 09:01:21 2010 (4BE16C21)
fffff880`05f9c000 fffff880`05fb7000 CTHWIUT CTHWIUT.SYS Wed May 05 09:01:32 2010 (4BE16C2C)
fffff880`04443000 fffff880`04474000 ctoss2k ctoss2k.sys Wed May 05 08:57:46 2010 (4BE16B4A)
fffff880`04474000 fffff880`0447c000 ctprxy2k ctprxy2k.sys Wed May 05 08:59:51 2010 (4BE16BC7)
fffff880`04800000 fffff880`04838000 ctsfm2k ctsfm2k.sys Wed May 05 08:57:33 2010 (4BE16B3D)
fffff880`04379000 fffff880`04397000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`087ed000 fffff880`087fd000 DgiVecp DgiVecp.sys Thu Sep 08 21:51:22 2005 (4320EA9A)
fffff880`040d9000 fffff880`040e8000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01924000 fffff880`0193a000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b0000 fffff880`045d2000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`08787000 fffff880`08791000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`087bc000 fffff880`087cf000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`08791000 fffff880`087bc000 dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`068d1000 fffff880`068dd000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0525e000 fffff880`05352000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`05352000 fffff880`05398000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`05d89000 fffff880`05dd3000 emupia2k emupia2k.sys Wed May 05 08:57:27 2010 (4BE16B37)
fffff880`010c7000 fffff880`010db000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0107b000 fffff880`010c7000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d3000 fffff880`013dd000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`018ea000 fffff880`01924000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0157f000 fffff880`015c9000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`05c08000 fffff880`05d89000 ha20x2k ha20x2k.sys Wed May 05 08:59:10 2010 (4BE16B9E)
fffff800`035f3000 fffff800`0363c000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04482000 fffff880`044a6000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`03dcf000 fffff880`03de8000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`03de8000 fffff880`03df0080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`03dc1000 fffff880`03dcf000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`086bf000 fffff880`08787000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`018e1000 fffff880`018ea000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`053ee000 fffff880`053fd000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06615000 fffff880`06623000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb2000 fffff800`00bbc000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04400000 fffff880`04443000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a8000 fffff880`013c2000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01554000 fffff880`0157f000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0447c000 fffff880`04481200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`049db000 fffff880`049ded80 LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`09310000 fffff880`09312480 LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`06600000 fffff880`06615000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`068eb000 fffff880`0690e000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`09306000 fffff880`09310000 LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
fffff880`06948000 fffff880`06999d00 lvrs64 lvrs64.sys Tue Nov 09 21:36:46 2010 (4CDA053E)
fffff880`07a08000 fffff880`07dfea80 lvuvc64 lvuvc64.sys Tue Nov 09 21:37:14 2010 (4CDA055A)
fffff880`00c52000 fffff880`00c5f000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`068dd000 fffff880`068eb000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0496a000 fffff880`04979000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03df1000 fffff880`03dfe000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00da1000 fffff880`00dbb000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`08600000 fffff880`08618000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`08618000 fffff880`08645000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`08645000 fffff880`08693000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`08693000 fffff880`086b6000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0185e000 fffff880`01869000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f84000 fffff880`00f8e000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010db000 fffff880`01139000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`040ce000 fffff880`040d9000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`018cf000 fffff880`018e1000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01402000 fffff880`014f4000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`053e2000 fffff880`053ee000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06623000 fffff880`06636000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04900000 fffff880`0492f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`065d3000 fffff880`065e8000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04016000 fffff880`04025000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04181000 fffff880`041c6000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`014f4000 fffff880`01554000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`03c5b000 fffff880`03d68000 netr28ux netr28ux.sys Tue Sep 15 00:36:45 2009 (4AAF19DD)
fffff880`01869000 fffff880`0187a000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`040c2000 fffff880`040ce000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03016000 fffff800`035f3000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01205000 fffff880`013a8000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`019ea000 fffff880`019f3000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0484f000 fffff880`048b2d80 nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
fffff880`00c00000 fffff880`00c2b000 nvstor nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`06400000 fffff880`06453000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`041cf000 fffff880`041f5000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04247000 fffff880`04264000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fce000 fffff880`00fe3000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8e000 fffff880`00fc1000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d91000 fffff880`00da1000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c2000 fffff880`013d3000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08a83000 fffff880`08b29000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04573000 fffff880`045b0000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5f000 fffff880`00c73000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`053be000 fffff880`053e2000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04a00000 fffff880`04a1b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0492f000 fffff880`04950000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04950000 fffff880`0496a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04071000 fffff880`040c2000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04a1b000 fffff880`04a26000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01843000 fffff880`0184c000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0184c000 fffff880`01855000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01855000 fffff880`0185e000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01895000 fffff880`018cf000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05e8c000 fffff880`05eb8000 rfcomm rfcomm.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06636000 fffff880`0664e000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06655000 fffff880`068b0d80 RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93)
fffff880`08b29000 fffff880`08b34000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0423b000 fffff880`04247000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04025000 fffff880`04042000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015d9000 fffff880`015e1000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`09270000 fffff880`09306000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`08a00000 fffff880`08a67000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`08b34000 fffff880`08b61000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`08b61000 fffff880`08b69000 SSPORT SSPORT.sys Thu Aug 11 19:07:32 2005 (42FBDA34)
fffff880`0100e000 fffff880`01070000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`053fd000 fffff880`053fe480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08bda000 fffff880`08bec000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0187a000 fffff880`01887000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`015e1000 fffff880`015ff000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0405d000 fffff880`04071000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`04200000 fffff880`04226000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03c00000 fffff880`03c54000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`049df000 fffff880`049f1000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0692d000 fffff880`06947c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0690e000 fffff880`0692b000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0692b000 fffff880`0692cf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`042c5000 fffff880`042d6000 usbehci usbehci.sys Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`04979000 fffff880`049d3000 usbhub usbhub.sys Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`04264000 fffff880`0426f000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0426f000 fffff880`042c5000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03d75000 fffff880`03d90000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00fc1000 fffff880`00fce000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01800000 fffff880`0180e000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015c9000 fffff880`015d9000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fe3000 fffff880`00ff8000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011ac000 fffff880`011f8000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d68000 fffff880`03d75000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`04000000 fffff880`04016000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`04042000 fffff880`0405d000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01833000 fffff880`01843000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e71000 fffff880`00f15000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f15000 fffff880`00f24000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`041c6000 fffff880`041cf000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00380000 win32k win32k.sys unavailable (00000000)
fffff880`00f7b000 fffff880`00f84000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`069dd000 fffff880`069fe000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`03d90000 fffff880`03dc1000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE)
Unloaded modules:
fffff880`08b69000 fffff880`08bda000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0196a000 fffff880`01978000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01978000 fffff880`01982000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`01982000 fffff880`019ad000 dump_nvstor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
fffff880`019ad000 fffff880`019c0000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`049aa000 fffff880`049db000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`04979000 fffff880`049aa000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000