Jaden Schulz

New Member
Joined
Dec 31, 2010
Messages
2
Well, that's what windows told me anyway. The thing is I'll be doing my thing which involves nothing more than minecraft and google chrome and messenger, and then the computer goes black, and then it turns back on. When the popup comes up on startup, here'es what it tells me:

Code:
Problem signature:
  Problem Event Name:	BlueScreen
  OS Version:	6.1.7600.2.0.0.768.3
  Locale ID:	4105

Additional information about the problem:
  BCCode:	1e
  BCP1:	FFFFFFFFC0000005
  BCP2:	FFFFF8800BA75FB0
  BCP3:	0000000000000000
  BCP4:	0000000000000000
  OS Version:	6_1_7600
  Service Pack:	0_0
  Product:	768_1

I assume it's a BSOD because of the first line.

Theres my Minidump file, it says. Ive had this error 3 times now so I assume thats why there's three files.
View attachment Minidump.zip

And Im using a laptop, an HP Pavilion dv6 with 8gb of RAM 750 GB HDD 1 GB video Memory, if thats mean anything.
 


Solution
Remove Symantec and replace with MSE:

Link Removed due to 404 Error

Link Removed




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123010-27830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a66000...
Remove Symantec and replace with MSE:

Link Removed due to 404 Error

Link Removed




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123010-27830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
Debug session time: Thu Dec 30 01:08:06.944 2010 (UTC - 5:00)
System Uptime: 0 days 2:54:34.019
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa7f98f831b3, 0, fffff80002ae3ae0, 7}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!FreeSMS+20 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa7f98f831b3, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ae3ae0, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e0
 fffffa7f98f831b3 

FAULTING_IP: 
nt!ExQueryDepthSList+0
fffff800`02ae3ae0 668b01          mov     ax,word ptr [rcx]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  TabTip.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800904ac50 -- (.trap 0xfffff8800904ac50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800867a0f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae3ae0 rsp=fffff8800904ade8 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffffffffffffe
r11=fffff80002c50e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!ExQueryDepthSList:
fffff800`02ae3ae0 668b01          mov     ax,word ptr [rcx] ds:ec60:fffffa80`0867a0f0=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b55b19 to fffff80002ad7f00

STACK_TEXT:  
fffff880`0904aae8 fffff800`02b55b19 : 00000000`00000050 fffffa7f`98f831b3 00000000`00000000 fffff880`0904ac50 : nt!KeBugCheckEx
fffff880`0904aaf0 fffff800`02ad5fee : 00000000`00000000 fffffa80`0867a0f0 fffff800`02c50e00 fffffa80`096dcc68 : nt! ?? ::FNODOBFM::`string'+0x40edb
fffff880`0904ac50 fffff800`02ae3ae0 : fffff960`000e30e8 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0904ade8 fffff960`000e30e8 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff880`0904ad90 : nt!ExQueryDepthSList
fffff880`0904adf0 fffff960`000e2fe3 : fffff900`c295b4e0 00000000`00000000 00000000`00000200 00000000`00000000 : win32k!FreeSMS+0x20
fffff880`0904ae20 fffff960`000ee6b6 : 00000000`00000000 00000000`00000000 00000000`00000200 fffff880`0904afd8 : win32k!xxxInterSendMsgEx+0x13c6
fffff880`0904af30 fffff960`0016ddd5 : 00000000`00000020 00000000`00000000 00000000`00000200 fffff880`0904b100 : win32k!xxxCallHook2+0x652
fffff880`0904b0a0 fffff960`0014465c : 00000000`00000000 00000000`0266f638 00000000`00000200 fffff800`00000000 : win32k!xxxCallNextHookEx+0x41
fffff880`0904b0e0 fffff960`001447e7 : 00000000`00000000 00000000`00000001 00000000`00000200 00000000`00000000 : win32k!NtUserfnHkINLPMSLLHOOKSTRUCT+0x40
fffff880`0904b130 fffff800`02ad7153 : fffffa80`096dcb60 fffff880`0904b1e0 00000000`00000000 00000000`00000020 : win32k!NtUserCallNextHookEx+0x13b
fffff880`0904b160 00000000`76e91c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0266f3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e91c1a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!FreeSMS+20
fffff960`000e30e8 663b4310        cmp     ax,word ptr [rbx+10h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  win32k!FreeSMS+20

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc5e0

FAILURE_BUCKET_ID:  X64_0x50_win32k!FreeSMS+20

BUCKET_ID:  X64_0x50_win32k!FreeSMS+20

Followup: MachineOwner
---------

















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123110-32978-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Fri Dec 31 00:54:17.505 2010 (UTC - 5:00)
System Uptime: 0 days 21:39:16.581
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 0, fffff880014fc391}

Probably caused by : NETIO.SYS ( NETIO!RtlCopyMdlToMdlIndirect+81 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880014fc391, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!RtlCopyMdlToMdlIndirect+81
fffff880`014fc391 448b6928        mov     r13d,dword ptr [rcx+28h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8800318ab80 -- (.trap 0xfffff8800318ab80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000002dc rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800318aec8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014fc391 rsp=fffff8800318ad10 rbp=fffff8800318ae80
 r8=fffff8800318aee8  r9=fffff8800318aeb0 r10=fffff8800179c3c0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyMdlToMdlIndirect+0x81:
fffff880`014fc391 448b6928        mov     r13d,dword ptr [rcx+28h] ds:ad78:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a89469 to fffff80002a89f00

STACK_TEXT:  
fffff880`0318aa38 fffff800`02a89469 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0318aa40 fffff800`02a880e0 : fffff880`00000001 fffff880`0318aeb0 00000001`00000000 00000001`00001400 : nt!KiBugCheckDispatch+0x69
fffff880`0318ab80 fffff880`014fc391 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0a953930 : nt!KiPageFault+0x260
fffff880`0318ad10 fffff880`01642fe4 : fffff880`0318aef8 fffff880`0318aec8 fffff880`0318aee8 fffff880`0318aeb0 : NETIO!RtlCopyMdlToMdlIndirect+0x81
fffff880`0318adb0 fffff880`016797e6 : 00000000`00000000 fffffa80`0bf90960 00000000`00000000 00000000`00000000 : tcpip!TcpSatisfyReceiveRequests+0x1f4
fffff880`0318b090 fffff880`0167a2f9 : fffffa80`07555d40 fffff880`0151fafb 00000000`000005b4 00000000`00000000 : tcpip!TcpDeliverDataToClient+0x106
fffff880`0318b210 fffff880`017311bf : fffffa80`0bf90960 fffff880`0318b600 00000000`000005b4 fffff880`0318b600 : tcpip!TcpDeliverReceive+0xa9
fffff880`0318b310 fffff880`016b98b0 : 00000000`daca6269 fffffa80`0bf90960 fffffa80`0816be20 fffffa80`0816be20 : tcpip!TcpInspectReceive+0xaf
fffff880`0318b360 fffff880`016746f5 : 00000000`00000006 00000000`00000002 00000000`000071c4 fffff880`02dc5000 : tcpip! ?? ::FNODOBFM::`string'+0x3d9b5
fffff880`0318b520 fffff880`016790ca : fffffa80`076b9f00 fffffa80`0abe9010 fffffa80`0755be98 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`0318b6d0 fffff880`01678c17 : fffffa80`09561108 fffffa80`076b5000 00000000`00000000 fffff880`0165c400 : tcpip!TcpMatchReceive+0x1fa
fffff880`0318b820 fffff880`0165b3c7 : fffffa80`076b5000 fffffa80`075871c4 fffffa80`076b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`0318b8d0 fffff880`0165b499 : fffff880`0318ba50 fffff880`0176b9a0 fffff880`0318ba60 00000000`6950e8c0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0318b990 fffff880`0165b990 : fffffa80`076ab000 fffffa80`09bdbe00 00000000`00000011 fffff880`0318ba50 : tcpip!IppProcessDeliverList+0x59
fffff880`0318ba00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x231


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!RtlCopyMdlToMdlIndirect+81
fffff880`014fc391 448b6928        mov     r13d,dword ptr [rcx+28h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!RtlCopyMdlToMdlIndirect+81

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81

BUCKET_ID:  X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\123110-36660-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
Debug session time: Fri Dec 31 01:07:23.927 2010 (UTC - 5:00)
System Uptime: 0 days 0:11:19.003
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8800ba75fb0, 0, 0}

Probably caused by : volsnap.sys ( volsnap!ExAllocateFromNPagedLookasideList+27 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800ba75fb0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
+6333383139656130
fffff880`0ba75fb0 d86ea7          fsubr   dword ptr [rsi-59h]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc20e0
 0000000000000000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  javaw.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff8800ba76ed8 -- (.exr 0xfffff8800ba76ed8)
ExceptionAddress: 0000030d0000030c
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000008
   Parameter[1]: 0000030d0000030c
Attempt to execute non-executable address 0000030d0000030c

TRAP_FRAME:  fffff8800ba76f80 -- (.trap 0xfffff8800ba76f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000030d
rdx=0000000000000308 rsi=0000000000000000 rdi=0000000000000000
rip=0000030d0000030c rsp=fffff8800ba77118 rbp=fffff8800ba773a0
 r8=0000000000000301  r9=0000000000000003 r10=fffffa8006731c80
r11=fffff8800ba772d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
0000030d`0000030c ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b1cb2b to fffff80002a8bf00

STACK_TEXT:  
fffff880`0ba75ef8 fffff800`02b1cb2b : 00000000`0000001e ffffffff`c0000005 fffff880`0ba75fb0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ba75f00 fffff800`02adf390 : fffff880`0ba764e0 fffff880`0ba768e0 fffff880`0ba76078 fffff880`0ba76068 : nt!KipFatalFilter+0x1b
fffff880`0ba75f40 fffff800`02aba4dc : 00000000`521cf158 00000000`521cf0d0 00000000`00000030 fffff880`0ba76078 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`0ba75f80 fffff800`02ab1bed : fffff800`02bd2470 fffff880`0ba771b0 00000000`00000000 fffff800`02a1a000 : nt!_C_specific_handler+0x8c
fffff880`0ba75ff0 fffff800`02ab9250 : fffff800`02bd2470 fffff880`0ba76068 fffff880`0ba76ed8 fffff800`02a1a000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0ba76020 fffff800`02ac61b5 : fffff880`0ba76ed8 fffff880`0ba76730 fffff880`00000000 fffffa80`06baec10 : nt!RtlDispatchException+0x410
fffff880`0ba76700 fffff800`02a8b542 : fffff880`0ba76ed8 fffffa80`06731c80 fffff880`0ba76f80 fffff880`0ba66000 : nt!KiDispatchException+0x135
fffff880`0ba76da0 fffff800`02a8a0ba : 00000000`00000008 fffffa80`06731c80 4051a8ca`c0691800 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0ba76f80 0000030d`0000030c : fffff880`0188f4c7 fffff880`0ba771b0 fffff800`02a8a0ba 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`0ba77118 fffff880`0188f4c7 : fffff880`0ba771b0 fffff800`02a8a0ba 00000000`00000000 fffff880`0ba77330 : 0x30d`0000030c
fffff880`0ba77120 fffff880`0188ccaa : fffffa80`09572410 00001f80`01002ba0 000007ff`ffff0000 00000000`6e3f82f4 : volsnap!ExAllocateFromNPagedLookasideList+0x27
fffff880`0ba77150 fffff880`0124e54a : fffff880`0ba772c8 00000000`00000200 fffff8a0`03f9a680 00000000`00004000 : volsnap! ?? ::FNODOBFM::`string'+0x471
fffff880`0ba77180 fffff800`02a9b64a : fffff880`0ba77350 fffff880`0124ce26 fffff880`0ba776a0 fffff8a0`03f9a680 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`0ba771b0 fffff880`0124cb69 : fffff880`0124e534 fffff880`0ba772c8 00000000`00004000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0ba77290 fffff880`0124c036 : fffffa80`088e56b0 00000000`00000000 fffff8a0`03f9a680 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xa9
fffff880`0ba77300 fffff880`0124f526 : fffff880`0ba776a0 fffffa80`06baec10 fffff8a0`03f9a680 0002ffff`00001fb3 : Ntfs!NtfsNonCachedIo+0x216
fffff880`0ba774d0 fffff880`01251f78 : fffff880`0ba776a0 fffffa80`06baec10 fffff880`0ba77701 fffffa80`07ed3301 : Ntfs!NtfsCommonRead+0x7a6
fffff880`0ba77670 fffff880`010af23f : fffffa80`06baefb0 fffffa80`06baec10 fffffa80`07ed33e0 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`0ba77870 fffff880`010ad6df : fffffa80`088e5040 fffffa80`06baec10 fffffa80`088e5000 fffffa80`06baec10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0ba77900 fffff800`02a7da52 : fffffa80`06baec30 fffffa80`09fa5070 00000000`00000043 fffff880`02fd5180 : fltmgr!FltpDispatch+0xcf
fffff880`0ba77960 fffff800`02a7dd55 : 00000000`00000001 00000000`00000001 fffff880`0ba77a60 fffffa80`09772850 : nt!IoPageRead+0x252
fffff880`0ba779f0 fffff800`02aa709b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`0ba77ac0 fffff800`02a89fee : 00000000`00000000 00000000`0048af45 00000000`00000001 fffffa80`06a1af60 : nt!MmAccessFault+0x14bb
fffff880`0ba77c20 00000000`77cd548f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`521cdc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cd548f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
volsnap!ExAllocateFromNPagedLookasideList+27
fffff880`0188f4c7 4883c420        add     rsp,20h

SYMBOL_STACK_INDEX:  a

SYMBOL_NAME:  volsnap!ExAllocateFromNPagedLookasideList+27

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: volsnap

IMAGE_NAME:  volsnap.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc128

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_volsnap!ExAllocateFromNPagedLookasideList+27

BUCKET_ID:  X64_0x1E_c0000005_volsnap!ExAllocateFromNPagedLookasideList+27

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`03800000 fffff880`0382b000   000      000.fcl      Fri Sep 26 09:11:22 2008 (48DCDF7A)
fffff880`04461000 fffff880`0446d000   Accelerometer Accelerometer.sys Wed Jul 08 14:41:38 2009 (4A54E862)
fffff880`00e00000 fffff880`00e57000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c4c000 fffff880`02cd6000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`045e7000 fffff880`045fd000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`04200000 fffff880`04215000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00de9000 fffff880`00df4000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fc6000 fffff880`00fcf000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fcf000 fffff880`00ff9000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0425e000 fffff880`04280000   AtiHdmi  AtiHdmi.sys  Thu Jan 28 20:03:36 2010 (4B6233E8)
fffff880`04215000 fffff880`04249000   atikmpag atikmpag.sys Fri Apr 16 05:11:16 2010 (4BC829B4)
fffff880`019bd000 fffff880`019c5000   AtiPcie  AtiPcie.sys  Mon Aug 24 04:25:26 2009 (4A924E76)
fffff880`048e9000 fffff880`04f58000   atipmdag atipmdag.sys Fri Apr 16 05:30:49 2010 (4BC82E49)
fffff960`008d0000 fffff960`00931000   ATMFD    ATMFD.DLL    Thu Jul 30 01:07:22 2009 (4A712A8A)
fffff880`00ec8000 fffff880`00ed4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`050ba000 fffff880`053a9000   bcmwl664 bcmwl664.sys Thu Jan 21 22:30:58 2010 (4B591BF2)
fffff880`01833000 fffff880`0183a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042e4000 fffff880`043d1000   BHDrvx64 BHDrvx64.sys Mon Nov 15 18:11:35 2010 (4CE1BE27)
fffff880`04183000 fffff880`04194000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04796000 fffff880`047b4000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`040e7000 fffff880`04183000   ccHPx64  ccHPx64.sys  Fri Feb 05 16:05:45 2010 (4B6C8829)
fffff960`006e0000 fffff960`00707000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`01800000 fffff880`0182a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0485d000 fffff880`0486f000   circlass circlass.sys Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0198d000 fffff880`019bd000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d1f000 fffff880`00d7d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`053f6000 fffff880`053fa500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`0140b000 fffff880`0147e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00ebf000 fffff880`00ec8000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`045d7000 fffff880`045e7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`041c2000 fffff880`041d0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03a0f000 fffff880`03a2d000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03a00000 fffff880`03a0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01977000 fffff880`0198d000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`042bd000 fffff880`042df000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04ff3000 fffff880`04fff000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041db000 fffff880`041ee000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`041d0000 fffff880`041db000   dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03bee000 fffff880`03bf6000   dvmio    dvmio.sys    Tue Nov 10 23:38:32 2009 (4AFA3FC8)
fffff880`041ee000 fffff880`041fa000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04470000 fffff880`04564000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04564000 fffff880`045aa000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03b53000 fffff880`03bc9000   eeCtrl64 eeCtrl64.sys Fri May 21 17:44:45 2010 (4BF6FECD)
fffff880`03bc9000 fffff880`03bee000   EraserUtilRebootDrv EraserUtilRebootDrv.sys Fri May 21 17:44:45 2010 (4BF6FECD)
fffff880`0407f000 fffff880`040b5000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`010f8000 fffff880`0110c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010ac000 fffff880`010f8000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0148f000 fffff880`01499000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0193d000 fffff880`01977000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0105e000 fffff880`010a8000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02ff7000 fffff800`03040000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`045aa000 fffff880`045ce000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0500e000 fffff880`05027000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05027000 fffff880`0502f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05000000 fffff880`0500e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`01933000 fffff880`0193d000   hpdskflt hpdskflt.sys Wed Jul 08 14:41:38 2009 (4A54E862)
fffff880`046ce000 fffff880`04796000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0192a000 fffff880`01933000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`053c7000 fffff880`053e5000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03aa2000 fffff880`03b1d000   IDSvia64 IDSvia64.sys Fri Nov 05 17:13:11 2010 (4CD47367)
fffff880`02d9e000 fffff880`02dc5000   Ironx64  Ironx64.SYS  Tue Apr 27 20:48:23 2010 (4BD785D7)
fffff880`053e5000 fffff880`053f4000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bc0000 fffff800`00bca000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0481a000 fffff880`0485d000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01200000 fffff880`0122b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`048db000 fffff880`048e0200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02de7000 fffff880`02dfc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c00000 fffff880`02c23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cfe000 fffff880`00d0b000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`02dd9000 fffff880`02de7000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04452000 fffff880`04461000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0503a000 fffff880`05047000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fac000 fffff880`00fc6000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`047b4000 fffff880`047cc000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`047cc000 fffff880`047f8000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`04600000 fffff880`0464d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`0464d000 fffff880`04670000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`00ee9000 fffff880`00ef4000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01400000 fffff880`0140b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e60000 fffff880`00e6a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03a97000 fffff880`03aa2000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`05030000 fffff880`0503a000   MTConfig MTConfig.sys Mon Jul 13 20:02:08 2009 (4A5BCB00)
fffff880`01918000 fffff880`0192a000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01499000 fffff880`0158b000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04f7c000 fffff880`04f88000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03910000 fffff880`03923000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04f88000 fffff880`04fb7000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04249000 fffff880`0425e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d60000 fffff880`02d6f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cd6000 fffff880`02d1b000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0158b000 fffff880`015eb000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0122b000 fffff880`0123c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03a8b000 fffff880`03a97000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1a000 fffff800`02ff7000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0182a000 fffff880`01833000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`038bd000 fffff880`03910000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d24000 fffff880`02d4a000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00eaa000 fffff880`00ebf000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e6a000 fffff880`00e9d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00dd9000 fffff880`00de9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0147e000 fffff880`0148f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0393b000 fffff880`039e1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04280000 fffff880`042bd000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d0b000 fffff880`00d1f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04f58000 fffff880`04f7c000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04fb7000 fffff880`04fd2000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04fd2000 fffff880`04ff3000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04800000 fffff880`0481a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03a3a000 fffff880`03a8b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0187d000 fffff880`01886000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015eb000 fffff880`015f4000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f4000 fffff880`015fd000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018de000 fffff880`01918000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03923000 fffff880`0393b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04670000 fffff880`0467b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`018d6000 fffff880`018de000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`02dc5000 fffff880`02dd9000   SRTSPX64 SRTSPX64.SYS Wed Feb 24 18:59:48 2010 (4B85BD74)
fffff880`08e34000 fffff880`08ecc000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`0382b000 fffff880`03894000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`0467b000 fffff880`046a8000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`04000000 fffff880`0407f000   stwrt64  stwrt64.sys  Mon Feb 01 02:34:43 2010 (4B668413)
fffff880`053fb000 fffff880`053fc480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0110c000 fffff880`0117a000   SYMDS64  SYMDS64.SYS  Mon Aug 17 19:35:30 2009 (4A89E942)
fffff880`0117a000 fffff880`011b5000   SYMEFA64 SYMEFA64.SYS Wed Apr 21 17:47:39 2010 (4BCF727B)
fffff880`03b1d000 fffff880`03b53000   SYMEVENT64x86 SYMEVENT64x86.SYS Thu Aug 13 18:28:21 2009 (4A849385)
fffff880`08ecc000 fffff880`08f42000   SYMTDIV  SYMTDIV.SYS  Tue May 04 00:38:27 2010 (4BDFA4C3)
fffff880`04400000 fffff880`04452000   SynTP    SynTP.sys    Fri Apr 09 17:43:53 2010 (4BBF9F99)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`046a8000 fffff880`046ba000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011d3000 fffff880`011e0000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011b5000 fffff880`011d3000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d8a000 fffff880`02d9e000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00580000 fffff960`0058a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`043d1000 fffff880`043f7000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0486f000 fffff880`04881000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`040b5000 fffff880`040d2000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`053f4000 fffff880`053f5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`053b6000 fffff880`053c7000   usbehci  usbehci.sys  Fri Dec 04 02:26:02 2009 (4B18B98A)
fffff880`050ad000 fffff880`050ba000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`04881000 fffff880`048db000   usbhub   usbhub.sys   Fri Dec 04 02:26:39 2009 (4B18B9AF)
fffff880`0504c000 fffff880`05057000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05057000 fffff880`050ad000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04194000 fffff880`041c1100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`00e9d000 fffff880`00eaa000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0183a000 fffff880`01848000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01848000 fffff880`0186d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ed4000 fffff880`00ee9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d7d000 fffff880`00dd9000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0188a000 fffff880`018d6000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`053a9000 fffff880`053b6000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d4a000 fffff880`02d60000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02d6f000 fffff880`02d8a000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0186d000 fffff880`0187d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ef9000 fffff880`00f9d000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f9d000 fffff880`00fac000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d1b000 fffff880`02d24000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`040d2000 fffff880`040e3000   WinUSB   WinUSB.sys   Mon Jul 13 20:06:28 2009 (4A5BCC04)
fffff880`045ce000 fffff880`045d7000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e57000 fffff880`00e60000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`02c23000 fffff880`02c44000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`08f42000 fffff880`08fb3000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`08fb3000 fffff880`08fb5000   MSPQM.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`019c5000 fffff880`019d3000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019d3000 fffff880`019df000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019df000 fffff880`019ea000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
fffff880`019ea000 fffff880`019fd000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`05000000 fffff880`0504c000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0004C000
 


Solution
Back
Top