By "uninstall Intel Turbo Boost", do you mean uninstall the Intel Turbo Boost driver? That's the only Intel Turbo Boost I can find on this computer. I disabled that; is it safe to uninstall? Furthermore, I disabled the Asus Turbo 33 technology that is supposed to work with Intel Turbo Boost.
This is my first time trying to change the RAM settings, but it appears that I don't have access to these options in the BIOS. The BIOS...
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-27534-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`03056000 PsLoadedModuleList = 0xfffff800`0328aeb0
Debug session time: Sat Apr 16 19:05:45.977 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:50.678
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031f1f8c, fffff88005442fd0, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031f1f8c, Address of the instruction which caused the bugcheck
Arg3: fffff88005442fd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx]
CONTEXT: fffff88005442fd0 -- (.cxr 0xfffff88005442fd0)
rax=fffff8a00cc6e000 rbx=0000000000000000 rcx=fffff8a00cc62b70
rdx=3940934e1b9c2500 rsi=fffff8a00cc6e000 rdi=fffff8a00cc24010
rip=fffff800031f1f8c rsp=fffff880054439a0 rbp=000000000000001d
r8=3940934e1b9c2500 r9=0000000000000000 r10=fffff8a00cc1cb70
r11=0000000000000000 r12=fffffa8003ddf280 r13=0000000000000000
r14=000000000000001d r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x100:
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx] ds:002b:3940934e`1b9c2500=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031f1f8c
STACK_TEXT:
fffff880`054439a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`031f1f8c 4c8b02 mov r8,qword ptr [rdx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88005442fd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-30420-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`03019000 PsLoadedModuleList = 0xfffff800`0324deb0
Debug session time: Mon Apr 18 03:26:47.940 2011 (UTC - 4:00)
System Uptime: 0 days 0:34:53.642
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa802bd80008, 2, 1, fffff80003140607}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802bd80008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003140607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b80e0
fffffa802bd80008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03140607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: services.exe
TRAP_FRAME: fffff8800a18e420 -- (.trap 0xfffff8800a18e420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800bd80010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003140607 rsp=fffff8800a18e5b0 rbp=00000000ffffffff
r8=fffff8800a18e5e0 r9=fffffa800b099b30 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x87:
fffff800`03140607 480fb328 btr qword ptr [rax],rbp ds:fca0:fffffa80`0bd80010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307eae9 to fffff8000307f580
STACK_TEXT:
fffff880`0a18e2d8 fffff800`0307eae9 : 00000000`0000000a fffffa80`2bd80008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a18e2e0 fffff800`0307d760 : 00000000`00000001 fffffa80`2bd80008 fffff8a0`14b01c00 fffffa80`0c53b780 : nt!KiBugCheckDispatch+0x69
fffff880`0a18e420 fffff800`03140607 : fffff8a0`14b01c80 fffffa80`0c53b780 fffffa80`0bac9d80 fffff8a0`14b01cb8 : nt!KiPageFault+0x260
fffff880`0a18e5b0 fffff800`030fb1d8 : ffffffff`00000080 01000000`0000000c 00000000`000000c0 00000000`03000000 : nt!MiReleaseConfirmedPageFileSpace+0x87
fffff880`0a18e630 fffff800`030c8254 : 00000000`00000000 00000000`0307ffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2a628
fffff880`0a18e7f0 fffff800`0307e7d3 : ffffffff`ffffffff fffffa80`0c53b780 00000000`00000000 00000000`00008000 : nt!NtFreeVirtualMemory+0x9d4
fffff880`0a18e900 fffff800`0307ad70 : fffff800`0330f0cf fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0a18ea98 fffff800`0330f0cf : fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`0a18eaa0 fffff800`03364022 : 00000000`03000000 00000000`00000000 00000000`00000000 fffffa80`0ba23e60 : nt!RtlFreeUserStack+0x27
fffff880`0a18ead0 fffff800`03367ae1 : 00000000`00000000 00000000`00000000 000007ff`fffa0000 00000000`00000000 : nt!PspExitThread+0x7ae
fffff880`0a18eb90 fffff800`03367da9 : fffffa80`0c53b780 00000000`00000000 fffffa80`0c53b780 000007ff`fffdf000 : nt!PspTerminateThreadByPointer+0x4d
fffff880`0a18ebe0 fffff800`0307e7d3 : fffffa80`0c53b780 fffff880`0a18eca0 00000000`77225270 00000000`0199f301 : nt!NtTerminateThread+0x45
fffff880`0a18ec20 00000000`7716fbea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0307f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7716fbea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03140607 480fb328 btr qword ptr [rax],rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-25786-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`03293eb0
Debug session time: Sat Apr 16 19:13:06.376 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:38.702
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa802b280008, 2, 1, fffff80003186607}
Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fe0e0
fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa802b280008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003186607, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa802b280008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from fffff800030c4ae9 to fffff800030c5580
STACK_TEXT:
fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+87
fffff800`03186607 480fb328 btr qword ptr [rax],rbp
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+87
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc792b2
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-38142-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
Machine Name:
Kernel base = 0xfffff800`0301b000 PsLoadedModuleList = 0xfffff800`0324feb0
Debug session time: Mon Apr 18 02:35:08.116 2011 (UTC - 4:00)
System Uptime: 1 days 3:50:06.890
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031b70bf, fffff8800d727dd0, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+233 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031b70bf, Address of the instruction which caused the bugcheck
Arg3: fffff8800d727dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+233
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10
CONTEXT: fffff8800d727dd0 -- (.cxr 0xfffff8800d727dd0)
rax=0000000000000000 rbx=0000000000000042 rcx=fffff88003f990f0
rdx=fffff900c35b6000 rsi=0000000000000000 rdi=fffff900c07f8db0
rip=fffff800031b70bf rsp=fffff8800d7287a0 rbp=0000000000000000
r8=2680914e1b9c2500 r9=fffff900c35b62c0 r10=fffff900c35b62d0
r11=0000000000000001 r12=fffff88003f98cc0 r13=0000000000000000
r14=000000000000001c r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!ExDeferredFreePool+0x233:
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10 ds:002b:00000000`00000008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: pidgin.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031b70bf
STACK_TEXT:
fffff880`0d7287a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x233
FOLLOWUP_IP:
nt!ExDeferredFreePool+233
fffff800`031b70bf 4c395008 cmp qword ptr [rax+8],r10
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+233
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff8800d727dd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233
Followup: Pool_corruption
---------
start end module name
fffff880`00e00000 fffff880`00e57000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02e7e000 fffff880`02f08000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04400000 fffff880`04416000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`0150c000 fffff880`01517000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03d5d000 fffff880`03d65000 ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
fffff880`0a9d6000 fffff880`0a9e1000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`014ce000 fffff880`014d7000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`014d7000 fffff880`01501000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04477000 fffff880`04704000 athrx athrx.sys Sat Nov 13 23:32:38 2010 (4CDF6666)
fffff880`047db000 fffff880`047e3000 ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
fffff960`00910000 fffff960`00971000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`00ec8000 fffff880`00ed4000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`042f7000 fffff880`042fe000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`043c0000 fffff880`043d1000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`07fbc000 fffff880`07fda000 bowser bowser.sys Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00710000 fffff960`00737000 cdd cdd.dll unavailable (00000000)
fffff880`0555a000 fffff880`05577000 cdfs cdfs.sys Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`04293000 fffff880`042bd000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfd000 fffff880`00dbd000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0119b000 fffff880`011cb000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9f000 fffff880`00cfd000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`047b7000 fffff880`047bb500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01200000 fffff880`01273000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00ebf000 fffff880`00ec8000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`047e3000 fffff880`047f3000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0521e000 fffff880`0522c000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`043a2000 fffff880`043c0000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04393000 fffff880`043a2000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019e7000 fffff880`019fd000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`054d2000 fffff880`054f4000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`03c73000 fffff880`03c86000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03a6b000 fffff880`03c73000 dump_iaStor dump_iaStor.sys Thu Dec 17 13:41:59 2009 (4B2A7B77)
fffff880`05591000 fffff880`0559d000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10ca3000 fffff880`10d97000 dxgkrnl dxgkrnl.sys Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`10da7000 fffff880`10ded000 dxgmms1 dxgmms1.sys Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`04746000 fffff880`0476b000 ETD ETD.sys Wed Jul 21 03:45:17 2010 (4C46A58D)
fffff880`03d65000 fffff880`03d9b000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01563000 fffff880`01577000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01517000 fffff880`01563000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0162b000 fffff880`01635000 Fs_Rec Fs_Rec.sys unavailable (00000000)
fffff880`01161000 fffff880`0119b000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01273000 fffff880`012bd000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`035ef000 fffff800`03638000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`09b20000 fffff880`09b44000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`09aa8000 fffff880`09ab9000 HECIx64 HECIx64.sys Thu Sep 17 15:54:16 2009 (4AB293E8)
fffff880`0a4b4000 fffff880`0a4cd000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`055df000 fffff880`055e7080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0a4a6000 fffff880`0a4b4000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07ef4000 fffff880`07fbc000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019de000 fffff880`019e7000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04728000 fffff880`04746000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012c6000 fffff880`014ce000 iaStor iaStor.sys Thu Dec 17 13:41:59 2009 (4B2A7B77)
fffff880`09085000 fffff880`09aa7e20 igdkmd64 igdkmd64.sys Fri Feb 11 14:16:32 2011 (4D558B10)
fffff880`04791000 fffff880`047b6180 Impcd Impcd.sys Mon Oct 26 16:39:41 2009 (4AE6090D)
fffff880`054fa000 fffff880`0553b000 IntcDAud IntcDAud.sys Fri Oct 30 10:56:33 2009 (4AEAFEA1)
fffff880`047c5000 fffff880`047db000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04782000 fffff880`04791000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0477a000 fffff880`04782000 kbfiltr kbfiltr.sys Mon Jul 20 05:21:42 2009 (4A643726)
fffff800`00bd4000 fffff800`00bde000 kdcom kdcom.dll Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`0902f000 fffff880`09072000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01600000 fffff880`0161a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01999000 fffff880`019c4000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`054f4000 fffff880`054f9200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0a299000 fffff880`0a2ae000 L1C62x64 L1C62x64.sys Fri Nov 13 04:47:36 2009 (4AFD2B38)
fffff880`03cca000 fffff880`03cdf000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`047f3000 fffff880`047fa000 lmimirr lmimirr.sys Tue Apr 10 18:32:45 2007 (461C108D)
fffff880`07ebf000 fffff880`07ed2000 LMIRfsDriver LMIRfsDriver.sys Mon Jul 14 12:26:56 2008 (487B7E50)
fffff880`03c86000 fffff880`03ca9000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`09b9a000 fffff880`09bd6880 mcdbus mcdbus.sys Tue Feb 24 05:34:07 2009 (49A3CD1F)
fffff880`00c47000 fffff880`00c8b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0a53d000 fffff880`0a54b000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0476b000 fffff880`0477a000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0a4cd000 fffff880`0a4da000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`010fb000 fffff880`01115000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`042bd000 fffff880`042ee000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`07ea8000 fffff880`07eb8000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`07fda000 fffff880`07ff2000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`07e00000 fffff880`07e2d000 mrxsmb mrxsmb.sys Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`07e2d000 fffff880`07e7b000 mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`07e7b000 fffff880`07e9e000 mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`01501000 fffff880`0150c000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0434c000 fffff880`04357000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e60000 fffff880`00e6a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0a3a9000 fffff880`0a3aaa80 MSPQM MSPQM.sys Mon Jul 13 20:00:17 2009 (4A5BCA91)
fffff880`01577000 fffff880`015d5000 msrpc msrpc.sys unavailable (00000000)
fffff880`02e71000 fffff880`02e7c000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019cc000 fffff880`019de000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01847000 fffff880`01939000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0443a000 fffff880`04446000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03d32000 fffff880`03d45000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`04446000 fffff880`04475000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`09bd7000 fffff880`09bec000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02f92000 fffff880`02fa1000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02f08000 fffff880`02f4d000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01939000 fffff880`01999000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0a91f000 fffff880`0a934000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`04357000 fffff880`04368000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02e65000 fffff880`02e71000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0301b000 fffff800`035ef000 nt ntkrnlmp.exe Tue Oct 26 22:47:14 2010 (4CC792B2)
fffff880`0164d000 fffff880`017f0000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`042ee000 fffff880`042f7000 Null Null.SYS unavailable (00000000)
fffff880`10ca1000 fffff880`10ca2180 nvBridge nvBridge.kmd Thu Mar 17 03:58:02 2011 (4D81BF0A)
fffff880`10045000 fffff880`10ca0300 nvlddmkm nvlddmkm.sys Thu Mar 17 04:08:59 2011 (4D81C19B)
fffff880`0183a000 fffff880`0183e980 nvpciflt nvpciflt.sys Thu Mar 17 04:09:43 2011 (4D81C1C7)
fffff880`03cdf000 fffff880`03d32000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02f56000 fffff880`02f7c000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00eaa000 fffff880`00ebf000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e6a000 fffff880`00e9d000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`010e4000 fffff880`010eb000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`010eb000 fffff880`010fb000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0161a000 fffff880`0162b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`08e1d000 fffff880`08ec3000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05200000 fffff880`05210000 point64 point64.sys Tue Dec 14 06:09:25 2010 (4D075065)
fffff880`05495000 fffff880`054d2000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c8b000 fffff880`00c9f000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`07eb8000 fffff880`07ebf000 RaInfo RaInfo.sys Fri Jan 04 13:57:14 2008 (477E818A)
fffff880`04416000 fffff880`0443a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`09b44000 fffff880`09b5f000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`09b5f000 fffff880`09b80000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`09b80000 fffff880`09b9a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02e14000 fffff880`02e65000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04331000 fffff880`0433a000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0433a000 fffff880`04343000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`04343000 fffff880`0434c000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01800000 fffff880`0183a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03d45000 fffff880`03d5d000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05273000 fffff880`05494080 RTKVHD64 RTKVHD64.sys Tue Jan 12 05:14:27 2010 (4B4C4B83)
fffff880`09000000 fffff880`0902f000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`08ec3000 fffff880`08ece000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`05588000 fffff880`05590a80 sncduvc sncduvc.SYS Mon Dec 29 04:14:26 2008 (495894F2)
fffff880`0405a000 fffff880`04211600 snp2uvc snp2uvc.sys Wed May 20 04:11:05 2009 (4A13BB19)
fffff880`019c4000 fffff880`019cc000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0a88a000 fffff880`0a91f000 srv srv.sys Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08f0d000 fffff880`08f74000 srv2 srv2.sys Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`08ece000 fffff880`08efb000 srvnet srvnet.sys Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`05577000 fffff880`05587d00 STREAM STREAM.SYS Mon Jul 13 20:06:18 2009 (4A5BCBFA)
fffff880`04475000 fffff880`04476480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a00000 fffff880`01bfd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`08efb000 fffff880`08f0d000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`04386000 fffff880`04393000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`04368000 fffff880`04386000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02e00000 fffff880`02e14000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`02fbc000 fffff880`02ffd000 truecrypt truecrypt.sys Sun Sep 05 10:23:16 2010 (4C83A7D4)
fffff960`00400000 fffff960`0040a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`043d1000 fffff880`043f7000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`09072000 fffff880`09084000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0553b000 fffff880`05558000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05558000 fffff880`05559f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`09ab9000 fffff880`09aca000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04000000 fffff880`0405a000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`09aca000 fffff880`09b20000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0559d000 fffff880`055b8000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00e9d000 fffff880`00eaa000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`042fe000 fffff880`0430c000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0430c000 fffff880`04331000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00ed4000 fffff880`00ee9000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01088000 fffff880`010e4000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01115000 fffff880`01161000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0a321000 fffff880`0a32e000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02f7c000 fffff880`02f92000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02fa1000 fffff880`02fbc000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`10d97000 fffff880`10da7000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00efb000 fffff880`00f9f000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f9f000 fffff880`00fae000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02f4d000 fffff880`02f56000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000b0000 fffff960`003c2000 win32k win32k.sys unavailable (00000000)
fffff880`047bc000 fffff880`047c5000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e57000 fffff880`00e60000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`03ca9000 fffff880`03cca000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`0a32e000 fffff880`0a338000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a934000 fffff880`0a965000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00031000
fffff880`0a30a000 fffff880`0a317000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a317000 fffff880`0a321000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a2f3000 fffff880`0a300000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a300000 fffff880`0a30a000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a2dc000 fffff880`0a2e9000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04602000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0018B000
fffff880`0a2e9000 fffff880`0a2f3000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a2c5000 fffff880`0a2d2000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a2d2000 fffff880`0a2dc000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a2ae000 fffff880`0a2bb000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a2bb000 fffff880`0a2c5000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a271000 fffff880`0a27e000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a27e000 fffff880`0a288000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a5bc000 fffff880`0a5d1000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a288000 fffff880`0a291000 cpuz135_x64.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`0a291000 fffff880`0a299000 600ee967-0bf
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
fffff880`0a5d1000 fffff880`0a5de000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04477000 fffff880`04704000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0028D000
fffff880`0a5de000 fffff880`0a5e8000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a200000 fffff880`0a271000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0a54b000 fffff880`0a5bc000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0a37d000 fffff880`0a38a000 vwifibus.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0a200000 fffff880`0a37d000 athrx.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0017D000
fffff880`0a38a000 fffff880`0a394000 vwifimp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0a519000 fffff880`0a52e000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a504000 fffff880`0a519000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a4ef000 fffff880`0a504000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a4da000 fffff880`0a4ef000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a394000 fffff880`0a3a9000 L1C62x64.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00015000
fffff880`0a3ad000 fffff880`0a3af000 MSPCLOCK.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00002000
fffff880`0a480000 fffff880`0a499000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`0a472000 fffff880`0a480000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0a499000 fffff880`0a4a6000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0a44c000 fffff880`0a465000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`0a43e000 fffff880`0a44c000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0a465000 fffff880`0a472000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0a418000 fffff880`0a431000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`0a40a000 fffff880`0a418000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0a431000 fffff880`0a43e000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0a3e4000 fffff880`0a3fd000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
fffff880`0a3d6000 fffff880`0a3e4000 hidusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0a3fd000 fffff880`0a40a000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`0a3bd000 fffff880`0a3d6000 HIDCLASS.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00019000
By "uninstall Intel Turbo Boost", do you mean uninstall the Intel Turbo Boost driver? That's the only Intel Turbo Boost I can find on this computer. I disabled that; is it safe to uninstall? Furthermore, I disabled the Asus Turbo 33 technology that is supposed to work with Intel Turbo Boost.
This is my first time trying to change the RAM settings, but it appears that I don't have access to these options in the BIOS. The BIOS options seem very limited for this laptop.