Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042311-29125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e4a000 PsLoadedModuleList = 0xfffff800`03087e50
Debug session time: Sat Apr 23 03:19:00.115 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:26.988
Loading Kernel Symbols
...............................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa80048a0b30, fffffa80048a0e10, fffff800031c32d0}
c0000005 Exception in ext.Analyze debugger extension.
PC: 000007fe`ff9b17a6 VA: 00000000`00000001 R/W: 0 Parameter: 00000000`00000000
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa80048a0b30, Terminating object
Arg3: fffffa80048a0e10, Process image file name
Arg4: fffff800031c32d0, Explanatory message (ascii)
Debugging Details:
------------------
c0000005 Exception in ext.analyze debugger extension.
PC: 000007fe`ff9b17a6 VA: 00000000`00000001 R/W: 0 Parameter: 00000000`00000000
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042411-33867-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`0303fe50
Debug session time: Sun Apr 24 08:08:30.017 2011 (UTC - 4:00)
System Uptime: 1 days 0:04:11.890
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {15d0, 9, 0, fffff88000dad66a}
Unable to load image \SystemRoot\system32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
*** ERROR: Module load completed but symbols could not be loaded for amd_sata.sys
Probably caused by : amd_sata.sys ( amd_sata+266a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000015d0, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000dad66a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030aa0e0
00000000000015d0
CURRENT_IRQL: 9
FAULTING_IP:
amd_sata+266a
fffff880`00dad66a 488b81d0150000 mov rax,qword ptr [rcx+15D0h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: plugin-contain
TRAP_FRAME: fffff88007b279a0 -- (.trap 0xfffff88007b279a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dad66a rsp=fffff88007b27b30 rbp=fffff88007b27ca0
r8=0000000000000029 r9=0000000000000000 r10=fffffa8004273008
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amd_sata+0x266a:
fffff880`00dad66a 488b81d0150000 mov rax,qword ptr [rcx+15D0h] ds:00000000`000015d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e71ca9 to fffff80002e72740
STACK_TEXT:
fffff880`07b27858 fffff800`02e71ca9 : 00000000`0000000a 00000000`000015d0 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff880`07b27860 fffff800`02e70920 : 00000000`0054c18c fffffa80`0427ef70 fffff880`009e8180 fffff800`02e7f618 : nt!KiBugCheckDispatch+0x69
fffff880`07b279a0 fffff880`00dad66a : 00000000`00000000 fffffa80`04273008 fffffa80`04274b68 fffff880`00dae8a0 : nt!KiPageFault+0x260
fffff880`07b27b30 00000000`00000000 : fffffa80`04273008 fffffa80`04274b68 fffff880`00dae8a0 fffffa80`04274b28 : amd_sata+0x266a
STACK_COMMAND: kb
FOLLOWUP_IP:
amd_sata+266a
fffff880`00dad66a 488b81d0150000 mov rax,qword ptr [rcx+15D0h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: amd_sata+266a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amd_sata
IMAGE_NAME: amd_sata.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bedc8c7
FAILURE_BUCKET_ID: X64_0xD1_amd_sata+266a
BUCKET_ID: X64_0xD1_amd_sata+266a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042411-22994-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e64000 PsLoadedModuleList = 0xfffff800`030a1e50
Debug session time: Sun Apr 24 12:09:53.308 2011 (UTC - 4:00)
System Uptime: 0 days 0:32:18.180
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {15d0, 9, 0, fffff88000dd166a}
Unable to load image \SystemRoot\system32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
*** ERROR: Module load completed but symbols could not be loaded for amd_sata.sys
Probably caused by : amd_sata.sys ( amd_sata+266a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000015d0, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000dd166a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310c0e0
00000000000015d0
CURRENT_IRQL: 9
FAULTING_IP:
amd_sata+266a
fffff880`00dd166a 488b81d0150000 mov rax,qword ptr [rcx+15D0h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c880 -- (.trap 0xfffff80000b9c880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000dd166a rsp=fffff80000b9ca10 rbp=fffff80000b9cb80
r8=0000000000000029 r9=0000000000000000 r10=fffffa8004255008
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
amd_sata+0x266a:
fffff880`00dd166a 488b81d0150000 mov rax,qword ptr [rcx+15D0h] ds:00000000`000015d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed3ca9 to fffff80002ed4740
STACK_TEXT:
fffff800`00b9c738 fffff800`02ed3ca9 : 00000000`0000000a 00000000`000015d0 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c740 fffff800`02ed2920 : 00000002`00000001 fffffa80`04260f70 00000000`00000010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c880 fffff880`00dd166a : 00000000`ffffffff fffffa80`04255008 fffffa80`04256b68 fffff880`00dd28a0 : nt!KiPageFault+0x260
fffff800`00b9ca10 00000000`ffffffff : fffffa80`04255008 fffffa80`04256b68 fffff880`00dd28a0 fffffa80`04256b28 : amd_sata+0x266a
fffff800`00b9ca18 fffffa80`04255008 : fffffa80`04256b68 fffff880`00dd28a0 fffffa80`04256b28 fffff800`00b9ca60 : 0xffffffff
fffff800`00b9ca20 fffffa80`04256b68 : fffff880`00dd28a0 fffffa80`04256b28 fffff800`00b9ca60 00000000`ffffffff : 0xfffffa80`04255008
fffff800`00b9ca28 fffff880`00dd28a0 : fffffa80`04256b28 fffff800`00b9ca60 00000000`ffffffff fffff880`00dd1a62 : 0xfffffa80`04256b68
fffff800`00b9ca30 fffffa80`04256b28 : fffff800`00b9ca60 00000000`ffffffff fffff880`00dd1a62 fffffa80`04aa8030 : amd_sata+0x38a0
fffff800`00b9ca38 fffff800`00b9ca60 : 00000000`ffffffff fffff880`00dd1a62 fffffa80`04aa8030 fffff800`00b9ca98 : 0xfffffa80`04256b28
fffff800`00b9ca40 00000000`ffffffff : fffff880`00dd1a62 fffffa80`04aa8030 fffff800`00b9ca98 fffff800`00000001 : 0xfffff800`00b9ca60
fffff800`00b9ca48 fffff880`00dd1a62 : fffffa80`04aa8030 fffff800`00b9ca98 fffff800`00000001 fffffa80`04260f70 : 0xffffffff
fffff800`00b9ca50 fffffa80`04aa8030 : fffff800`00b9ca98 fffff800`00000001 fffffa80`04260f70 00000000`00000000 : amd_sata+0x2a62
fffff800`00b9ca58 fffff800`00b9ca98 : fffff800`00000001 fffffa80`04260f70 00000000`00000000 fffff880`010cc0a3 : 0xfffffa80`04aa8030
fffff800`00b9ca60 fffff800`00000001 : fffffa80`04260f70 00000000`00000000 fffff880`010cc0a3 fffff800`fffffff8 : 0xfffff800`00b9ca98
fffff800`00b9ca68 fffffa80`04260f70 : 00000000`00000000 fffff880`010cc0a3 fffff800`fffffff8 fffff800`02ed0347 : 0xfffff800`00000001
fffff800`00b9ca70 00000000`00000000 : fffff880`010cc0a3 fffff800`fffffff8 fffff800`02ed0347 fffffa80`00000000 : 0xfffffa80`04260f70
STACK_COMMAND: kb
FOLLOWUP_IP:
amd_sata+266a
fffff880`00dd166a 488b81d0150000 mov rax,qword ptr [rcx+15D0h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: amd_sata+266a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amd_sata
IMAGE_NAME: amd_sata.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bedc8c7
FAILURE_BUCKET_ID: X64_0xD1_amd_sata+266a
BUCKET_ID: X64_0xD1_amd_sata+266a
Followup: MachineOwner
---------
start end module name
fffff880`00f33000 fffff880`00f8a000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c9b000 fffff880`02d25000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b97000 fffff880`03bad000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dcf000 fffff880`00de5000 amd_sata amd_sata.sys Fri May 14 18:03:51 2010 (4BEDC8C7)
fffff880`01120000 fffff880`0112b000 amd_xata amd_xata.sys Fri May 14 18:03:52 2010 (4BEDC8C8)
fffff880`011eb000 fffff880`01200000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0112b000 fffff880`01149000 amdsata amdsata.sys Tue May 19 13:53:21 2009 (4A12F211)
fffff880`01149000 fffff880`01154000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03c95000 fffff880`03ce4000 Apfiltr Apfiltr.sys Fri Apr 09 04:01:50 2010 (4BBEDEEE)
fffff880`00d9c000 fffff880`00da5000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00da5000 fffff880`00dcf000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04467000 fffff880`045e6000 athrx athrx.sys Fri Nov 06 15:56:02 2009 (4AF48D62)
fffff880`03a6f000 fffff880`03aa3000 atikmpag atikmpag.sys Tue Jul 13 05:51:00 2010 (4C3C3704)
fffff880`0163a000 fffff880`01642000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`03cef000 fffff880`0435e000 atipmdag atipmdag.sys Tue Jul 13 06:32:12 2010 (4C3C40AC)
fffff880`00e00000 fffff880`00e0c000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`0147a000 fffff880`01481000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ded000 fffff880`02dfe000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03987000 fffff880`039a5000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00600000 fffff960`00627000 cdd cdd.dll unavailable (00000000)
fffff880`01200000 fffff880`0122a000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cab000 fffff880`00d6b000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01400000 fffff880`01430000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c4d000 fffff880`00cab000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043d7000 fffff880`043db500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01481000 fffff880`014f4000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00ff2000 fffff880`00ffb000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`043dc000 fffff880`043ec000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05f36000 fffff880`05f44000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c77000 fffff880`02c95000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017e6000 fffff880`017fc000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04950000 fffff880`04972000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05f4e000 fffff880`05f64000 dump_amd_sata dump_amd_sata.sys Fri May 14 18:03:51 2010 (4BEDC8C7)
fffff880`05f44000 fffff880`05f4e000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`05f64000 fffff880`05f77000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05f2a000 fffff880`05f36000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03aa3000 fffff880`03b97000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`0435e000 fffff880`043a4000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`011a0000 fffff880`011b4000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01154000 fffff880`011a0000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01505000 fffff880`0150f000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015a5000 fffff880`015df000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0150f000 fffff880`01559000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e1b000 fffff800`02e64000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`043a4000 fffff880`043c8000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`038b5000 fffff880`0397d000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017dd000 fffff880`017e6000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03c68000 fffff880`03c86000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03c86000 fffff880`03c95000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bc9000 fffff800`00bd3000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04818000 fffff880`0485b000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013e5000 fffff880`013ff000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01798000 fffff880`017c3000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04972000 fffff880`04977200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05c82000 fffff880`05c97000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c3e000 fffff880`05c61000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c2c000 fffff880`00c39000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05fc4000 fffff880`05fd2000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`043c8000 fffff880`043d7000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00d82000 fffff880`00d9c000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`039a5000 fffff880`039bd000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`039bd000 fffff880`039ea000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`03800000 fffff880`0384e000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`0384e000 fffff880`03871000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`0108c000 fffff880`01097000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f93000 fffff880`00f9d000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017cb000 fffff880`017dd000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01646000 fffff880`01738000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043ec000 fffff880`043f8000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`05fd2000 fffff880`05fe5000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`03bd1000 fffff880`03c00000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`048c7000 fffff880`048dc000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02daf000 fffff880`02dbe000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d25000 fffff880`02d6a000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01738000 fffff880`01798000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01097000 fffff880`010a8000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e64000 fffff800`03441000 nt ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01242000 fffff880`013e5000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01471000 fffff880`0147a000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05c97000 fffff880`05cea000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d73000 fffff880`02d99000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fdd000 fffff880`00ff2000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f9d000 fffff880`00fd0000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00d6b000 fffff880`00d72000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00d72000 fffff880`00d82000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014f4000 fffff880`01505000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06613000 fffff880`066b9000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04913000 fffff880`04950000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c39000 fffff880`00c4d000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`011b4000 fffff880`011bfe00 PxHlpa64 PxHlpa64.sys Tue Jun 23 19:16:35 2009 (4A416253)
fffff880`03bad000 fffff880`03bd1000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03a00000 fffff880`03a1b000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03a1b000 fffff880`03a3c000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03a3c000 fffff880`03a56000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0122a000 fffff880`01233000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01233000 fffff880`0123c000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01083000 fffff880`0108c000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01600000 fffff880`0163a000 rdyboost rdyboost.sys Sat Jun 19 00:25:06 2010 (4C1C46A2)
fffff880`05fe5000 fffff880`05ffd000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03c00000 fffff880`03c57000 Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
fffff880`048dc000 fffff880`04912d80 RtHDMIVX RtHDMIVX.sys Tue Jan 26 22:04:58 2010 (4B5FAD5A)
fffff880`05cfa000 fffff880`05f29800 RTKVHD64 RTKVHD64.sys Wed Mar 17 04:49:15 2010 (4BA0978B)
fffff880`05c00000 fffff880`05c3e000 RtsUStor RtsUStor.sys Thu Mar 11 22:23:06 2010 (4B99B39A)
fffff880`066b9000 fffff880`066c4000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04463000 fffff880`04465f00 SFEP SFEP.sys Fri Nov 27 00:39:13 2009 (4B0F6601)
fffff880`017c3000 fffff880`017cb000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0676a000 fffff880`067ff000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06703000 fffff880`0676a000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`066c4000 fffff880`066f1000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`010be000 fffff880`01120000 storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`045fe000 fffff880`045ff480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`066f1000 fffff880`06703000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`011de000 fffff880`011eb000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`011c0000 fffff880`011de000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dd9000 fffff880`02ded000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`00c00000 fffff880`00c26000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`0485b000 fffff880`0486d000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05f77000 fffff880`05f94000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05f94000 fffff880`05f95f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03c57000 fffff880`03c68000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04456000 fffff880`04463000 usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`0486d000 fffff880`048c7000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`045f3000 fffff880`045fe000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04400000 fffff880`04456000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05f96000 fffff880`05fc3200 usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`00fd0000 fffff880`00fdd000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015df000 fffff880`015ed000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0105e000 fffff880`01083000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e0c000 fffff880`00e21000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e21000 fffff880`00e7d000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01559000 fffff880`015a5000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`045e6000 fffff880`045f3000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d99000 fffff880`02daf000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0397d000 fffff880`03987000 vwifimp vwifimp.sys Mon Jul 13 20:07:28 2009 (4A5BCC40)
fffff880`02dbe000 fffff880`02dd9000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015ed000 fffff880`015fd000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e80000 fffff880`00f24000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f24000 fffff880`00f33000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d6a000 fffff880`02d73000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00312000 win32k win32k.sys unavailable (00000000)
fffff880`00f8a000 fffff880`00f93000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05c61000 fffff880`05c82000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`04978000 fffff880`049e9000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01430000 fffff880`0143e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0143e000 fffff880`01448000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`01448000 fffff880`0145e000 dump_amd_sat
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00016000
fffff880`0145e000 fffff880`01471000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
How do I change the memory setting?