Bsod can't figure out had it for 2 months Can barley run the pc now

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by bowman1268, Mar 27, 2011.

  1. bowman1268

    bowman1268 New Member

    Joined:
    Jan 9, 2011
    Messages:
    12
    Likes Received:
    0
    I have been trying to trouble shoot this for a couple months it appears random sometimes going days no problem other times crashing to blue every 10 to 15 minutes.

    [​IMG]


    [​IMG]


    [​IMG]




    032711-30092-01.dmp 3/27/2011 2:05:30 AM PFN_LIST_CORRUPT 0x0000004e 00000000`00000002 00000000`000728e9 00000000`0022ffff 00000000`00002000 ntoskrnl.exe ntoskrnl.exe+70740 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7600.16695 (win7_gdr.101026-1503) x64 C:\Windows\Minidump\032711-30092-01.dmp 6 15 7600 275,264


    Let me know it you need any info I am desperate to fix this it is driving me nuts.
     
    #1 bowman1268, Mar 27, 2011
    Last edited: Mar 27, 2011
  2. bowman1268

    bowman1268 New Member

    Joined:
    Jan 9, 2011
    Messages:
    12
    Likes Received:
    0
    I have attached a rammon text file and the minidmp files in hopes that it will help.
     

    Attached Files:

    #2 bowman1268, Mar 27, 2011
    Last edited: Mar 27, 2011
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    PFN_LIST_CORRUPT


    Set your memory 667Mhz 6-5-5-15 1.8v.


    Attach the crash dumps ffrom C:\Windows\Minidump.
     
    #3 cybercore, Mar 27, 2011
    Last edited: Mar 27, 2011
  4. bowman1268

    bowman1268 New Member

    Joined:
    Jan 9, 2011
    Messages:
    12
    Likes Received:
    0
    Double checked ram settings they matched up to your recommendations but still blue screening.
     
  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. Follow my post.




    2. Again, attach your crash dumps and attach the new screenshot of CPUZ memory tab, so I can see if the new settings are right.
     
  6. bowman1268

    bowman1268 New Member

    Joined:
    Jan 9, 2011
    Messages:
    12
    Likes Received:
    0
    The crash dumps are attached.The rar labeled as bsod above and can't get new captures because I had to switch to my laptop because after changing the ram to the recommended settings now the system blue screens before fully loading half the time the other half it locks up in bios load.I have not gotten under my desk to do a hard bios reset yet.
     
    #6 bowman1268, Mar 27, 2011
    Last edited: Mar 27, 2011
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321



    What I suggest:


    1. RAM must be set to its rated specs: 667Mhz 6-5-5-15 1.8v.
    Re-attach the memory tab so I can see the right settings.




    2. Uninstall Avast, install MSE:

    http://www.microsoft.com/security_essentials/




    3. Update drivers:

    Creative Audio
    ctac32k.sys Wed Jul 02 04:38:22 2008

    IEEE-1284 parallel class driver for ECP, Byte, and Nibble modes - Device Guys or Samsung
    DgiVecp.sys Thu Sep 08 21:51:22 2005

    Logitech GamePanel
    LGVirHid.sys Mon Nov 23 20:36:48 2009

    Ralink Wireless
    netr28ux.sys Tue Sep 15 00:36:45 2009

    nForce
    nvm62x64.sys Fri Oct 17 17:01:06 2008






    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032711-18049-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03259e50
    Debug session time: Sun Mar 27 02:56:09.426 2011 (UTC - 4:00)
    System Uptime: 0 days 4:48:51.971
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 1f1f2, 2, 1b4f1}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000001f1f2, page frame number
    Arg3: 0000000000000002, current page state
    Arg4: 000000000001b4f1, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  bitRipper.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000311c38c to fffff8000308c740
    
    STACK_TEXT:  
    fffff880`0b5da2e8 fffff800`0311c38c : 00000000`0000004e 00000000`00000099 00000000`0001f1f2 00000000`00000002 : nt!KeBugCheckEx
    fffff880`0b5da2f0 fffff800`030e94d2 : 00000000`00000002 00000000`00000000 fffffa80`004ed980 fffff800`032435f8 : nt!MiBadShareCount+0x4c
    fffff880`0b5da330 fffff800`0314d2ad : fffffa80`004ed980 fffff880`0b5da480 00000000`00000080 00000000`0019ca32 : nt! ?? ::FNODOBFM::`string'+0x11aa2
    fffff880`0b5da390 fffff800`0304141e : 00000000`00000000 fffff880`0b5da480 ffffffff`ffffffff 00000000`00000210 : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
    fffff880`0b5da410 fffff800`030b86ce : fffff980`0e7fc000 00000000`0c054532 fffff880`00000000 00000000`00001000 : nt! ?? ::FNODOBFM::`string'+0x44ef3
    fffff880`0b5da600 fffff800`030b8434 : fffffa80`0c34ce10 00000000`0c054532 fffff880`0b5da740 00000000`000303e8 : nt!CcMapAndCopyInToCache+0x20e
    fffff880`0b5da6f0 fffff880`012c7fb8 : 00000001`18f703e8 fffffa80`0c385800 fffff880`0b5da7e0 fffffa80`000388d2 : nt!CcCopyWrite+0x194
    fffff880`0b5da780 fffff880`010f1132 : fffffa80`0c3858b0 fffff880`010f4732 fffffa80`000388d2 00000000`00038801 : Ntfs!NtfsCopyWriteA+0x208
    fffff880`0b5da970 fffff880`010f4c2a : fffff880`0b5daa40 fffffa80`0727b878 00000000`0c050000 00000000`00038800 : fltmgr!FltpPerformFastIoCall+0xf2
    fffff880`0b5da9d0 fffff880`011127fe : 00000000`000388d2 00000000`00000000 fffffa80`0c3858b0 fffff880`0b5dab40 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`0b5daa10 fffff800`033a164e : fffffa80`0c385924 fffffa80`0c3858b0 00000000`00000000 fffffa80`0c385924 : fltmgr!FltpFastIoWrite+0x1ce
    fffff880`0b5daab0 fffff800`0308b993 : 00000000`75262401 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x5ad
    fffff880`0b5dabb0 00000000`75262dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`02d2f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75262dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0311c38c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032611-19593-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03059000 PsLoadedModuleList = 0xfffff800`03296e50
    Debug session time: Sat Mar 26 22:05:51.657 2011 (UTC - 4:00)
    System Uptime: 0 days 4:37:38.203
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 2e967, 0, 2ea67}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000002e967, page frame number
    Arg3: 0000000000000000, current page state
    Arg4: 000000000002ea67, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000315938c to fffff800030c9740
    
    STACK_TEXT:  
    fffff880`0c6b3f98 fffff800`0315938c : 00000000`0000004e 00000000`00000099 00000000`0002e967 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0c6b3fa0 fffff800`0313b9f7 : 00000000`00000000 fffff680`0005ab78 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
    fffff880`0c6b3fe0 fffff800`0309dc13 : fffffa80`06da1b30 fffff700`0001fa56 0000007f`fffffff8 fffff8a0`0aa0e3f8 : nt! ?? ::FNODOBFM::`string'+0x3223e
    fffff880`0c6b4070 fffff800`0309c67a : fffffa80`06da1b30 fffffa80`00000000 fffff880`0001ec08 fffff800`00000005 : nt!MiDeleteAddressesInWorkingSet+0x307
    fffff880`0c6b4920 fffff800`033acabf : fffff8a0`09b539a0 fffff880`0c6b4c20 00000000`00000000 fffffa80`06ef3b60 : nt!MmCleanProcessAddressSpace+0x96
    fffff880`0c6b4970 fffff800`03386735 : 00000000`c0000005 00000000`c0000001 00000000`7ef14000 fffffa80`0ca33530 : nt!PspExitThread+0x92f
    fffff880`0c6b4a30 fffff800`030a61cb : 00000000`00000100 fffffa80`06ef3c20 00000000`00000001 fffff800`030d0b9d : nt!PsExitSpecialApc+0x1d
    fffff880`0c6b4a60 fffff800`030a6610 : 00000000`00000000 fffff880`0c6b4ae0 fffff800`0338684c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`0c6b4ae0 fffff800`030c8a37 : fffffa80`06ef3b60 00000000`0000184c fffff880`0c6b4bf8 fffffa80`0be071e0 : nt!KiInitiateUserApc+0x70
    fffff880`0c6b4c20 00000000`75412dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`2069ef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75412dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0315938c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032411-29608-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`0300c000 PsLoadedModuleList = 0xfffff800`03249e50
    Debug session time: Thu Mar 24 04:16:34.944 2011 (UTC - 4:00)
    System Uptime: 1 days 12:10:31.129
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 1863f5, 1, 185cf5}
    
    Probably caused by : udfs.sys ( udfs!UdfFlushVolume+964 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 00000000001863f5, page frame number
    Arg3: 0000000000000001, current page state
    Arg4: 0000000000185cf5, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000310c38c to fffff8000307c740
    
    STACK_TEXT:  
    fffff880`0316f7b8 fffff800`0310c38c : 00000000`0000004e 00000000`00000099 00000000`001863f5 00000000`00000001 : nt!KeBugCheckEx
    fffff880`0316f7c0 fffff800`030213d7 : 00000000`001863f5 00000000`00032392 fffffa80`0096ab60 00000580`00000000 : nt!MiBadShareCount+0x4c
    fffff880`0316f800 fffff800`03061b82 : 00000000`00000000 fffff8a0`16d5a000 00000000`00000000 fffff8a0`16cfe200 : nt! ?? ::FNODOBFM::`string'+0x2d244
    fffff880`0316f8f0 fffff880`064aa814 : fffffa80`0a877348 00000000`00000000 fffffa80`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x172
    fffff880`0316f960 fffff880`064bc99e : fffffa80`06fde7e0 fffffa80`0a5be5a0 fffff800`03221500 00000000`00000001 : udfs!UdfFlushVolume+0x964
    fffff880`0316fa00 fffff880`06481096 : fffffa80`06fde7e0 fffffa80`06e4ae10 fffffa80`06e4af28 fffffa80`06e4ae10 : udfs!UdfCommonShutdown+0xc2
    fffff880`0316faa0 fffff880`010b26af : fffffa80`0aa58db0 fffffa80`06e4ae10 fffff800`03281210 fffffa80`06e4ae10 : udfs!UdfFsdDispatch+0x356
    fffff880`0316fb10 fffff800`032cb1cc : fffffa80`0aa59060 fffff800`0322be00 00000000`00000001 00000000`00000000 : fltmgr!FltpDispatch+0x9f
    fffff880`0316fb70 fffff800`032cb362 : 00000000`00000001 00000000`00000001 fffff800`032215a0 00000000`00000000 : nt!IopShutdownBaseFileSystems+0xac
    fffff880`0316fbf0 fffff800`032cc046 : fffff800`032cbe60 fffff800`032215a0 00000000`00000001 fffff880`01280050 : nt!IoShutdownSystem+0x122
    fffff880`0316fc70 fffff800`03089961 : fffff800`032cbe60 fffff880`012a6230 fffffa80`06a32601 fffffa80`00000004 : nt!PopGracefulShutdown+0x1e6
    fffff880`0316fcb0 fffff800`0331f7c6 : 00000000`00000000 fffffa80`06a32680 00000000`00000080 fffffa80`06a0b040 : nt!ExpWorkerThread+0x111
    fffff880`0316fd40 fffff800`0305ac26 : fffff880`030a4180 fffffa80`06a32680 fffff880`030af040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`0316fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    udfs!UdfFlushVolume+964
    fffff880`064aa814 3ac3            cmp     al,bl
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  udfs!UdfFlushVolume+964
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: udfs
    
    IMAGE_NAME:  udfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc1f9
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_udfs!UdfFlushVolume+964
    
    BUCKET_ID:  X64_0x4E_99_udfs!UdfFlushVolume+964
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032611-20451-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
    Debug session time: Sat Mar 26 17:26:48.656 2011 (UTC - 4:00)
    System Uptime: 0 days 13:24:58.217
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 2f3b2, 0, 118bb2}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000002f3b2, page frame number
    Arg3: 0000000000000000, current page state
    Arg4: 0000000000118bb2, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  audiodg.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000310238c to fffff80003072740
    
    STACK_TEXT:  
    fffff880`0c6b91d8 fffff800`0310238c : 00000000`0000004e 00000000`00000099 00000000`0002f3b2 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0c6b91e0 fffff800`030e4ce2 : 00000000`00000000 fffffa80`049f8480 0000000f`ffffffff 00000000`00000000 : nt!MiBadShareCount+0x4c
    fffff880`0c6b9220 fffff800`030b8ac1 : ad200001`00000000 fffff680`00014f80 00000000`00000200 000fffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x3252e
    fffff880`0c6b92a0 fffff800`030b3dee : 00000000`00000002 fffff880`00000000 fffffa80`08014060 fffffa80`080143f8 : nt!MiDecommitPages+0x1a1
    fffff880`0c6b9b30 fffff800`03071993 : ffffffff`ffffffff 00000000`028ddd88 00000000`028ddd80 00000000`00000001 : nt!NtFreeVirtualMemory+0x2de
    fffff880`0c6b9c20 00000000`76fbf89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`028ddcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fbf89a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0310238c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\032711-30092-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`03253e50
    Debug session time: Sun Mar 27 03:03:11.200 2011 (UTC - 4:00)
    System Uptime: 0 days 0:05:48.745
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {2, 728e9, 22ffff, 2000}
    
    Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000002, A list entry was corrupt
    Arg2: 00000000000728e9, entry in list being removed
    Arg3: 000000000022ffff, highest physical page number
    Arg4: 0000000000002000, reference count of entry being removed
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff800030a76be to fffff80003086740
    
    STACK_TEXT:  
    fffff880`031fbab8 fffff800`030a76be : 00000000`0000004e 00000000`00000002 00000000`000728e9 00000000`0022ffff : nt!KeBugCheckEx
    fffff880`031fbac0 fffff800`030bcc40 : 00000000`00000001 fffff800`00000000 00000000`00000000 fffffa80`00000053 : nt!MiUnlinkPageFromLockedList+0x8e
    fffff880`031fbb50 fffff800`030bda6c : 00000000`00000000 fffffa80`090d7a40 fffffa80`090d7ad8 00000000`00000005 : nt!MiGatherMappedPages+0x108
    fffff880`031fbc50 fffff800`033297c6 : fffffa80`06a51040 00000000`00000080 fffffa80`06a28040 c781f123`f38bfe03 : nt!MiMappedPageWriter+0x198
    fffff880`031fbd40 fffff800`03064c26 : fffff880`030a4180 fffffa80`06a51040 fffff880`030af040 23ce03e8`0b05c6c1 : nt!PspSystemThreadStartup+0x5a
    fffff880`031fbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiUnlinkPageFromLockedList+8e
    fffff800`030a76be cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+8e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
    
    BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
    
    Followup: MachineOwner
    ---------
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00f24000 fffff880`00f7b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`040ed000 fffff880`04177000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`053a8000 fffff880`053be000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`04226000 fffff880`0423b000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`01070000 fffff880`0107b000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`043f1000 fffff880`043f9000   AppleCharger AppleCharger.sys Mon Apr 26 23:54:05 2010 (4BD65FDD)
    fffff880`069d4000 fffff880`069dd000   aswFsBlk aswFsBlk.SYS Thu Jan 13 03:37:10 2011 (4D2EB9B6)
    fffff880`0699a000 fffff880`069d4000   aswMonFlt aswMonFlt.sys Thu Jan 13 03:37:21 2011 (4D2EB9C1)
    fffff880`04177000 fffff880`04181000   aswRdr   aswRdr.SYS   Thu Jan 13 03:37:32 2011 (4D2EB9CC)
    fffff880`043a8000 fffff880`043f1000   aswSP    aswSP.SYS    Thu Jan 13 03:41:42 2011 (4D2EBAC6)
    fffff880`013dd000 fffff880`013ed000   aswTdi   aswTdi.SYS   Thu Jan 13 03:40:19 2011 (4D2EBA73)
    fffff880`00e63000 fffff880`00e6c000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dbb000 fffff880`00de5000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`068b1000 fffff880`068d1000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`04a27000 fffff880`0525e000   atikmdag atikmdag.sys Tue Jan 04 21:48:52 2011 (4D23DC14)
    fffff880`048b3000 fffff880`04900000   atikmpag atikmpag.sys Tue Jan 04 21:19:38 2011 (4D23D53A)
    fffff960`00930000 fffff960`00991000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`019f3000 fffff880`019fa000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04397000 fffff880`043a8000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`087cf000 fffff880`087ed000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff880`08a67000 fffff880`08a77000   BthEnum  BthEnum.sys  Mon Jul 13 20:06:52 2009 (4A5BCC1C)
    fffff880`05eb8000 fffff880`05ed8000   bthpan   bthpan.sys   Mon Jul 13 20:07:00 2009 (4A5BCC24)
    fffff880`05e00000 fffff880`05e8c000   bthport  bthport.sys  Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`06453000 fffff880`0646b000   BTHUSB   BTHUSB.sys   Mon Jul 13 20:06:52 2009 (4A5BCC1C)
    fffff960`006c0000 fffff960`006e7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`019c0000 fffff880`019ea000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cd1000 fffff880`00d91000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0193a000 fffff880`0196a000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c73000 fffff880`00cd1000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01139000 fffff880`011ac000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`05398000 fffff880`053a8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`09313000 fffff880`0931c000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
    fffff880`065e8000 fffff880`065f6000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`042f6000 fffff880`04379000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`05fb7000 fffff880`05fec000   CT20XUT  CT20XUT.SYS  Wed May 05 09:01:28 2010 (4BE16C28)
    fffff880`05eee000 fffff880`05f9c000   ctac32k  ctac32k.sys  Wed Jul 02 04:38:22 2008 (486B3E7E)
    fffff880`044cd000 fffff880`04572700   ctaud2k  ctaud2k.sys  Wed May 05 08:59:48 2010 (4BE16BC4)
    fffff880`06476000 fffff880`065d3000   CTEXFIFX CTEXFIFX.SYS Wed May 05 09:01:21 2010 (4BE16C21)
    fffff880`05f9c000 fffff880`05fb7000   CTHWIUT  CTHWIUT.SYS  Wed May 05 09:01:32 2010 (4BE16C2C)
    fffff880`04443000 fffff880`04474000   ctoss2k  ctoss2k.sys  Wed May 05 08:57:46 2010 (4BE16B4A)
    fffff880`04474000 fffff880`0447c000   ctprxy2k ctprxy2k.sys Wed May 05 08:59:51 2010 (4BE16BC7)
    fffff880`04800000 fffff880`04838000   ctsfm2k  ctsfm2k.sys  Wed May 05 08:57:33 2010 (4BE16B3D)
    fffff880`04379000 fffff880`04397000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`087ed000 fffff880`087fd000   DgiVecp  DgiVecp.sys  Thu Sep 08 21:51:22 2005 (4320EA9A)
    fffff880`040d9000 fffff880`040e8000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01924000 fffff880`0193a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`045b0000 fffff880`045d2000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`08787000 fffff880`08791000   dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
    fffff880`087bc000 fffff880`087cf000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`08791000 fffff880`087bc000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`068d1000 fffff880`068dd000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`0525e000 fffff880`05352000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`05352000 fffff880`05398000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`05d89000 fffff880`05dd3000   emupia2k emupia2k.sys Wed May 05 08:57:27 2010 (4BE16B37)
    fffff880`010c7000 fffff880`010db000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0107b000 fffff880`010c7000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`013d3000 fffff880`013dd000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`018ea000 fffff880`01924000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0157f000 fffff880`015c9000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`05c08000 fffff880`05d89000   ha20x2k  ha20x2k.sys  Wed May 05 08:59:10 2010 (4BE16B9E)
    fffff800`035f3000 fffff800`0363c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04482000 fffff880`044a6000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`03dcf000 fffff880`03de8000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`03de8000 fffff880`03df0080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`03dc1000 fffff880`03dcf000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`086bf000 fffff880`08787000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`018e1000 fffff880`018ea000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`053ee000 fffff880`053fd000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06615000 fffff880`06623000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bb2000 fffff800`00bbc000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`04400000 fffff880`04443000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013a8000 fffff880`013c2000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01554000 fffff880`0157f000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0447c000 fffff880`04481200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`049db000 fffff880`049ded80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`09310000 fffff880`09312480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
    fffff880`06600000 fffff880`06615000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`068eb000 fffff880`0690e000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`09306000 fffff880`09310000   LVPr2M64 LVPr2M64.sys Fri May 07 21:38:16 2010 (4BE4C088)
    fffff880`06948000 fffff880`06999d00   lvrs64   lvrs64.sys   Tue Nov 09 21:36:46 2010 (4CDA053E)
    fffff880`07a08000 fffff880`07dfea80   lvuvc64  lvuvc64.sys  Tue Nov 09 21:37:14 2010 (4CDA055A)
    fffff880`00c52000 fffff880`00c5f000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`068dd000 fffff880`068eb000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0496a000 fffff880`04979000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`03df1000 fffff880`03dfe000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00da1000 fffff880`00dbb000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`08600000 fffff880`08618000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`08618000 fffff880`08645000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`08645000 fffff880`08693000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`08693000 fffff880`086b6000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`0185e000 fffff880`01869000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f84000 fffff880`00f8e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010db000 fffff880`01139000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`040ce000 fffff880`040d9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`018cf000 fffff880`018e1000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01402000 fffff880`014f4000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`053e2000 fffff880`053ee000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06623000 fffff880`06636000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04900000 fffff880`0492f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`065d3000 fffff880`065e8000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`04016000 fffff880`04025000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04181000 fffff880`041c6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`014f4000 fffff880`01554000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`03c5b000 fffff880`03d68000   netr28ux netr28ux.sys Tue Sep 15 00:36:45 2009 (4AAF19DD)
    fffff880`01869000 fffff880`0187a000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`040c2000 fffff880`040ce000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03016000 fffff800`035f3000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01205000 fffff880`013a8000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`019ea000 fffff880`019f3000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0484f000 fffff880`048b2d80   nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
    fffff880`00c00000 fffff880`00c2b000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
    fffff880`06400000 fffff880`06453000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`041cf000 fffff880`041f5000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`04247000 fffff880`04264000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`00fce000 fffff880`00fe3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f8e000 fffff880`00fc1000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00d91000 fffff880`00da1000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`013c2000 fffff880`013d3000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08a83000 fffff880`08b29000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`04573000 fffff880`045b0000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c5f000 fffff880`00c73000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`053be000 fffff880`053e2000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`04a00000 fffff880`04a1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0492f000 fffff880`04950000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`04950000 fffff880`0496a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04071000 fffff880`040c2000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`04a1b000 fffff880`04a26000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01843000 fffff880`0184c000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0184c000 fffff880`01855000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01855000 fffff880`0185e000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01895000 fffff880`018cf000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05e8c000 fffff880`05eb8000   rfcomm   rfcomm.sys   Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`06636000 fffff880`0664e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06655000 fffff880`068b0d80   RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93)
    fffff880`08b29000 fffff880`08b34000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`0423b000 fffff880`04247000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`04025000 fffff880`04042000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
    fffff880`015d9000 fffff880`015e1000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`09270000 fffff880`09306000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`08a00000 fffff880`08a67000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`08b34000 fffff880`08b61000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`08b61000 fffff880`08b69000   SSPORT   SSPORT.sys   Thu Aug 11 19:07:32 2005 (42FBDA34)
    fffff880`0100e000 fffff880`01070000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
    fffff880`053fd000 fffff880`053fe480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`08bda000 fffff880`08bec000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`0187a000 fffff880`01887000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`015e1000 fffff880`015ff000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`0405d000 fffff880`04071000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`04200000 fffff880`04226000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03c00000 fffff880`03c54000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`049df000 fffff880`049f1000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0692d000 fffff880`06947c00   usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0690e000 fffff880`0692b000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0692b000 fffff880`0692cf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`042c5000 fffff880`042d6000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
    fffff880`04979000 fffff880`049d3000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
    fffff880`04264000 fffff880`0426f000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0426f000 fffff880`042c5000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`03d75000 fffff880`03d90000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00fc1000 fffff880`00fce000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`01800000 fffff880`0180e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0180e000 fffff880`01833000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`015c9000 fffff880`015d9000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00fe3000 fffff880`00ff8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`011ac000 fffff880`011f8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03d68000 fffff880`03d75000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`04000000 fffff880`04016000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`04042000 fffff880`0405d000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01833000 fffff880`01843000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e71000 fffff880`00f15000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f15000 fffff880`00f24000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`041c6000 fffff880`041cf000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00070000 fffff960`00380000   win32k   win32k.sys   unavailable (00000000)
    fffff880`00f7b000 fffff880`00f84000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`069dd000 fffff880`069fe000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    fffff880`03d90000 fffff880`03dc1000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)
    
    Unloaded modules:
    fffff880`08b69000 fffff880`08bda000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0196a000 fffff880`01978000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01978000 fffff880`01982000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`01982000 fffff880`019ad000   dump_nvstor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002B000
    fffff880`019ad000 fffff880`019c0000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`049aa000 fffff880`049db000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00031000
    fffff880`04979000 fffff880`049aa000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00031000
    
    
     
  8. bowman1268

    bowman1268 New Member

    Joined:
    Jan 9, 2011
    Messages:
    12
    Likes Received:
    0
    OK I will see if I can get it to boot long enough to update drivers and get new screens.
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321

Share This Page

Loading...