Usually that 100MB of space is for BitLocker to do it's thing - I don't use it, so I don't have it on any of my systems to check on.
Windows has made corrections to the file system.
So, Windows made some fixes. Keep an eye on this and run it again in a week or so. Repeated errors may indicate that the drive is failing.
HDTune is a nice program - but nothing beats the test developed by the people who manufactured the hard drive. They know best what their hard drives are supposed to do. HD Diagnostic
The full memory dump was from Jan 29 and involved the NTFS.SYS error also. As CHKDSK /R was run after that, it's likely that it has corrected the errors.
So, what we do here is wait - wait for the next BSOD. If none occurs that's great - but if you do get one, we'll run the dump file and see if it indicates a need to run Driver Verifier (with certain settings).
Here's the dump analysis:
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\FUBAR\TempDUMP\DATA\01.dmp]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a3e000 PsLoadedModuleList = 0x82b86810
Debug session time: Fri Jan 29 19:30:04.378 2010 (GMT-5)
System Uptime: 0 days 0:00:09.330
Loading Kernel Symbols
..................................................
Loading User Symbols
0: kd> !thread;!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck;.logclose;q
THREAD 84d759a0 Cid 0004.0008 Teb: 00000000 Win32Thread: 00000000 RUNNING on processor 0
IRP List:
85af1968: (0006,01fc) Flags: 00060874 Mdl: 00000000
Not impersonating
DeviceMap 8b408b98
Owning Process 84d75c78 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 598 Ticks: 0
Context Switch Count 511
UserTime 00:00:00.000
KernelTime 00:00:01.185
Win32 Start Address nt!Phase1Initialization (0x82bc946f)
Stack Init 80786fd0 Current 80785ba8 Base 80787000 Limit 80784000 Call 0
Priority 31 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
ChildEBP RetAddr Args to Child
8078633c 82a845f8 00000000 9c4532a4 00000000 nt!MmAccessFault+0x106
8078633c 8a6db2aa 00000000 9c4532a4 00000000 nt!KiTrap0E+0xdc (FPO: [0,0] TrapFrame @ 80786354)
80786404 8a6e89f3 80786510 85f6d208 85f15410 Ntfs!NtfsFillStandardInfo+0x127 (FPO: [SEH])
80786424 8a6d43e4 80786510 85f6d208 8c4530f8 Ntfs!NtfsQueryStandardInfo+0x3e (FPO: [6,0,4])
80786498 8a6d9a4d 80786510 85af1968 0a1fce07 Ntfs!NtfsCommonQueryInformation+0x548 (FPO: [SEH])
807864fc 8a6e7d53 80786510 85af1968 00000001 Ntfs!NtfsFsdDispatchSwitch+0x17b (FPO: [SEH])
80786630 82a7a4bc 85dd5020 85af1968 85af1968 Ntfs!NtfsFsdDispatchWait+0x1c (FPO: [2,72,0])
80786648 8a40620c 85dbf020 85af1968 00000000 nt!IofCallDriver+0x63
8078666c 8a4063cb 8078668c 85dbf020 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa (FPO: [3,4,4])
807866a4 82a7a4bc 85dbf020 85af1968 00000000 fltmgr!FltpDispatch+0xc5 (FPO: [2,6,4])
807866bc 82c9ae96 a58a338f 80786794 80786820 nt!IofCallDriver+0x63
80786778 82a8142a 0000014c 80786878 00786848 nt!NtQueryInformationFile+0x779
80786778 82a7fbb1 0000014c 80786878 00786848 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 80786794)
80786804 82c04155 8000014c 80786878 80786848 nt!ZwQueryInformationFile+0x11 (FPO: [5,0,0])
807868bc 82c02607 8000014c 82b86810 84d759a0 nt!MmCheckSystemImage+0x131
80786904 82c02411 80786b30 00000000 80786928 nt!MiCreateSectionForDriver+0x8f
8078692c 82c01de6 80786998 80786b30 00000000 nt!MiObtainSectionForDriver+0x96
807869a8 82be12c0 80786b30 00000000 00000000 nt!MmLoadSystemImage+0x1db
80786b9c 82def853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x386
80786be8 82deb87b 8080f828 8080a490 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 82df0e6f 0080a490 84d75d10 84d759a0 nt!IoInitSystem+0x6de
80786d48 82bc947c 80786d90 82c4c66d 8080a490 nt!Phase1InitializationDiscard+0xce4
80786d50 82c4c66d 8080a490 a58a3967 00000000 nt!Phase1Initialization+0xd
80786d90 82afe0d9 82bc946f 8080a490 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 9c4532a4, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 8a6db2aa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
READ_ADDRESS: 9c4532a4
FAULTING_IP:
Ntfs!NtfsFillStandardInfo+127
8a6db2aa f6400401 test byte ptr [eax+4],1
MM_INTERNAL_CODE: 2
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
MODULE_NAME: Ntfs
FAULTING_MODULE: 8a63c000 Ntfs
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: 80786354 -- (.trap 0xffffffff80786354)
.trap 0xffffffff80786354
ErrCode = 00000000
eax=9c4532a0 ebx=85f15410 ecx=00000000 edx=00000000 esi=8c4530f8 edi=8c453250
eip=8a6db2aa esp=807863c8 ebp=80786404 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210286
Ntfs!NtfsFillStandardInfo+0x127:
8a6db2aa f6400401 test byte ptr [eax+4],1 ds:0023:9c4532a4=??
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a845f8 to 82ac38e3
STACK_TEXT:
8078633c 82a845f8 00000000 9c4532a4 00000000 nt!MmAccessFault+0x106
8078633c 8a6db2aa 00000000 9c4532a4 00000000 nt!KiTrap0E+0xdc
80786404 8a6e89f3 80786510 85f6d208 85f15410 Ntfs!NtfsFillStandardInfo+0x127
80786424 8a6d43e4 80786510 85f6d208 8c4530f8 Ntfs!NtfsQueryStandardInfo+0x3e
80786498 8a6d9a4d 80786510 85af1968 0a1fce07 Ntfs!NtfsCommonQueryInformation+0x548
807864fc 8a6e7d53 80786510 85af1968 00000001 Ntfs!NtfsFsdDispatchSwitch+0x17b
80786630 82a7a4bc 85dd5020 85af1968 85af1968 Ntfs!NtfsFsdDispatchWait+0x1c
80786648 8a40620c 85dbf020 85af1968 00000000 nt!IofCallDriver+0x63
8078666c 8a4063cb 8078668c 85dbf020 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
807866a4 82a7a4bc 85dbf020 85af1968 00000000 fltmgr!FltpDispatch+0xc5
807866bc 82c9ae96 a58a338f 80786794 80786820 nt!IofCallDriver+0x63
80786778 82a8142a 0000014c 80786878 00786848 nt!NtQueryInformationFile+0x779
80786778 82a7fbb1 0000014c 80786878 00786848 nt!KiFastCallEntry+0x12a
80786804 82c04155 8000014c 80786878 80786848 nt!ZwQueryInformationFile+0x11
807868bc 82c02607 8000014c 82b86810 84d759a0 nt!MmCheckSystemImage+0x131
80786904 82c02411 80786b30 00000000 80786928 nt!MiCreateSectionForDriver+0x8f
8078692c 82c01de6 80786998 80786b30 00000000 nt!MiObtainSectionForDriver+0x96
807869a8 82be12c0 80786b30 00000000 00000000 nt!MmLoadSystemImage+0x1db
80786b9c 82def853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x386
80786be8 82deb87b 8080f828 8080a490 00000000 nt!IopInitializeSystemDrivers+0x163
80786c6c 82df0e6f 0080a490 84d75d10 84d759a0 nt!IoInitSystem+0x6de
80786d48 82bc947c 80786d90 82c4c66d 8080a490 nt!Phase1InitializationDiscard+0xce4
80786d50 82c4c66d 8080a490 a58a3967 00000000 nt!Phase1Initialization+0xd
80786d90 82afe0d9 82bc946f 8080a490 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsFillStandardInfo+127
8a6db2aa f6400401 test byte ptr [eax+4],1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: Ntfs!NtfsFillStandardInfo+127
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: 0x50_Ntfs!NtfsFillStandardInfo+127
BUCKET_ID: 0x50_Ntfs!NtfsFillStandardInfo+127
Followup: MachineOwner
---------
eax=82b7517c ebx=c0602700 ecx=00000000 edx=00000000 esi=82b67d20 edi=00000000
eip=82ac38e3 esp=807862b8 ebp=8078633c iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00200202
nt!MmAccessFault+0x106:
82ac38e3 cc int 3
ChildEBP RetAddr Args to Child
8078633c 82a845f8 00000000 9c4532a4 00000000 nt!MmAccessFault+0x106
8078633c 8a6db2aa 00000000 9c4532a4 00000000 nt!KiTrap0E+0xdc (FPO: [0,0] TrapFrame @ 80786354)
80786404 8a6e89f3 80786510 85f6d208 85f15410 Ntfs!NtfsFillStandardInfo+0x127 (FPO: [SEH])
80786424 8a6d43e4 80786510 85f6d208 8c4530f8 Ntfs!NtfsQueryStandardInfo+0x3e (FPO: [6,0,4])
80786498 8a6d9a4d 80786510 85af1968 0a1fce07 Ntfs!NtfsCommonQueryInformation+0x548 (FPO: [SEH])
807864fc 8a6e7d53 80786510 85af1968 00000001 Ntfs!NtfsFsdDispatchSwitch+0x17b (FPO: [SEH])
80786630 82a7a4bc 85dd5020 85af1968 85af1968 Ntfs!NtfsFsdDispatchWait+0x1c (FPO: [2,72,0])
80786648 8a40620c 85dbf020 85af1968 00000000 nt!IofCallDriver+0x63
8078666c 8a4063cb 8078668c 85dbf020 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa (FPO: [3,4,4])
807866a4 82a7a4bc 85dbf020 85af1968 00000000 fltmgr!FltpDispatch+0xc5 (FPO: [2,6,4])
807866bc 82c9ae96 a58a338f 80786794 80786820 nt!IofCallDriver+0x63
80786778 82a8142a 0000014c 80786878 00786848 nt!NtQueryInformationFile+0x779
80786778 82a7fbb1 0000014c 80786878 00786848 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 80786794)
80786804 82c04155 8000014c 80786878 80786848 nt!ZwQueryInformationFile+0x11 (FPO: [5,0,0])
807868bc 82c02607 8000014c 82b86810 84d759a0 nt!MmCheckSystemImage+0x131
80786904 82c02411 80786b30 00000000 80786928 nt!MiCreateSectionForDriver+0x8f
8078692c 82c01de6 80786998 80786b30 00000000 nt!MiObtainSectionForDriver+0x96
807869a8 82be12c0 80786b30 00000000 00000000 nt!MmLoadSystemImage+0x1db
80786b9c 82def853 00000001 00000000 80786bd4 nt!IopLoadDriver+0x386
80786be8 82deb87b 8080f828 8080a490 00000000 nt!IopInitializeSystemDrivers+0x163
start end module name
80ba9000 80bb1000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
82a07000 82a3e000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
82a3e000 82e4e000 nt ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
8a209000 8a281000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8a281000 8a292000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8a292000 8a29a000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
8a29a000 8a2dc000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8a2dc000 8a387000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8a387000 8a3f8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8a400000 8a434000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8a43b000 8a449000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8a449000 8a491000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8a491000 8a49a000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8a49a000 8a4a2000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8a4a2000 8a4cc000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8a4cc000 8a4d7000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8a4d7000 8a4e8000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8a4e8000 8a4f8000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8a4f8000 8a543000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8a543000 8a54a000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8a54a000 8a558000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a558000 8a56e000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8a56e000 8a577000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a577000 8a59a000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
8a59a000 8a5b4000 jraid jraid.sys Fri Jul 17 11:31:37 2009 (4A609959)
8a5b4000 8a5da000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
8a5da000 8a5e3000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
8a5e3000 8a5f4000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8a63c000 8a76b000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
8a76b000 8a796000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8a796000 8a7a9000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8a7a9000 8a7ce000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8a7ce000 8a7d9000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8a7d9000 8a7ea000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8a800000 8a811000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8a811000 8a81e000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8a81e000 8a827000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a827000 8a884000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8a884000 8a892000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8a892000 8a89b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8a89b000 8a952000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8a952000 8a990000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8a990000 8a9b5000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468)
8a9b5000 8a9c5000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8a9c5000 8a9f7000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8aa00000 8aa2d000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8aa32000 8ab7b000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E)
8ab7b000 8abac000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
8abac000 8abeb000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8abeb000 8abf3000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
8abf3000 8abfb000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
start end module name
8a449000 8a491000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8a5da000 8a5e3000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
8a56e000 8a577000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a577000 8a59a000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
8a292000 8a29a000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
8a2dc000 8a387000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8a7a9000 8a7ce000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8a29a000 8a2dc000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8a827000 8a884000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8a811000 8a81e000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8a800000 8a811000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8a81e000 8a827000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a7ce000 8a7d9000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8a7d9000 8a7ea000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8a5e3000 8a5f4000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8a400000 8a434000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8a892000 8a89b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8a9c5000 8a9f7000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
8ab7b000 8abac000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82a07000 82a3e000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8abf3000 8abfb000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8a59a000 8a5b4000 jraid jraid.sys Fri Jul 17 11:31:37 2009 (4A609959)
80ba9000 80bb1000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8a796000 8a7a9000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8a990000 8a9b5000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468)
8a209000 8a281000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8a558000 8a56e000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8a49a000 8a4a2000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8a76b000 8a796000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8a9b5000 8a9c5000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8a89b000 8a952000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8a952000 8a990000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
82a3e000 82e4e000 nt ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
8a63c000 8a76b000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
8a4d7000 8a4e8000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8a4a2000 8a4cc000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8a543000 8a54a000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8a54a000 8a558000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
8a884000 8a892000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8a281000 8a292000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8aa00000 8aa2d000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8a5b4000 8a5da000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
8abeb000 8abf3000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
8aa32000 8ab7b000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E)
8a4cc000 8a4d7000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8a4e8000 8a4f8000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8a4f8000 8a543000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8abac000 8abeb000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8a387000 8a3f8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8a43b000 8a449000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8a491000 8a49a000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
Bugcheck code 00000050
Arguments 9c4532a4 00000000 8a6db2aa 00000002