Recurring BSODs

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by siren, Apr 18, 2011.

  1. siren

    siren New Member

    Joined:
    Apr 18, 2011
    Messages:
    4
    Likes Received:
    0
    Hi all,

    I've been having recurring BSODs on my new laptop. The dump files and other related files are attached. Not sure what other information is required, but this is the model of my laptop (with the same specifications).

    Thank you for any help.
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Your blue screens are caused by Ram .

    Probably affected by Intel Turbo Boost,

    the current settings are: 1066 Mhz 7-7-7-20
    should be: 1333 Mhz 9-9-9-24 1.5v

    Set it right according to the manufacturer's rates. Uninstall Intel Turbo Boost.

    ~~~~~~~~~~~

    Update drivers:

    Web Cam
    sncduvc.SYS Mon Dec 29 04:14:26 2008
    Notebook support

    Intel Management Engine
    HECIx64.sys Thu Sep 17 15:54:16 2009
    IntelĀ® Driver Update Utility

    Intel Matrix Storage
    iaStor.sys Thu Dec 17 13:41:59 2009
    IntelĀ® Driver Update Utility

    MagicISO
    mcdbus.sys Tue Feb 24 05:34:07 2009

    Atheros LAN
    L1C62x64.sys Fri Nov 13 04:47:36 2009




    If crashes persist, uninstall LogMeIn/Remotely Anywhere
    LMIRfsDriver.sys Mon Jul 14 12:26:56 2008




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041611-27534-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
    Machine Name:
    Kernel base = 0xfffff800`03056000 PsLoadedModuleList = 0xfffff800`0328aeb0
    Debug session time: Sat Apr 16 19:05:45.977 2011 (UTC - 4:00)
    System Uptime: 0 days 0:10:50.678
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800031f1f8c, fffff88005442fd0, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
    
    Followup: Pool_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800031f1f8c, Address of the instruction which caused the bugcheck
    Arg3: fffff88005442fd0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+100
    fffff800`031f1f8c 4c8b02          mov     r8,qword ptr [rdx]
    
    CONTEXT:  fffff88005442fd0 -- (.cxr 0xfffff88005442fd0)
    rax=fffff8a00cc6e000 rbx=0000000000000000 rcx=fffff8a00cc62b70
    rdx=3940934e1b9c2500 rsi=fffff8a00cc6e000 rdi=fffff8a00cc24010
    rip=fffff800031f1f8c rsp=fffff880054439a0 rbp=000000000000001d
     r8=3940934e1b9c2500  r9=0000000000000000 r10=fffff8a00cc1cb70
    r11=0000000000000000 r12=fffffa8003ddf280 r13=0000000000000000
    r14=000000000000001d r15=0000000000000001
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!ExDeferredFreePool+0x100:
    fffff800`031f1f8c 4c8b02          mov     r8,qword ptr [rdx] ds:002b:3940934e`1b9c2500=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031f1f8c
    
    STACK_TEXT:  
    fffff880`054439a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x100
    
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+100
    fffff800`031f1f8c 4c8b02          mov     r8,qword ptr [rdx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+100
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff88005442fd0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100
    
    BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+100
    
    Followup: Pool_corruption
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041811-30420-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
    Machine Name:
    Kernel base = 0xfffff800`03019000 PsLoadedModuleList = 0xfffff800`0324deb0
    Debug session time: Mon Apr 18 03:26:47.940 2011 (UTC - 4:00)
    System Uptime: 0 days 0:34:53.642
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .........................................
    Loading User Symbols
    Loading unloaded module list
    ................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa802bd80008, 2, 1, fffff80003140607}
    
    Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa802bd80008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003140607, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b80e0
     fffffa802bd80008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03140607 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  services.exe
    
    TRAP_FRAME:  fffff8800a18e420 -- (.trap 0xfffff8800a18e420)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa800bd80010 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003140607 rsp=fffff8800a18e5b0 rbp=00000000ffffffff
     r8=fffff8800a18e5e0  r9=fffffa800b099b30 r10=0000000fffffffff
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiReleaseConfirmedPageFileSpace+0x87:
    fffff800`03140607 480fb328        btr     qword ptr [rax],rbp ds:fca0:fffffa80`0bd80010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000307eae9 to fffff8000307f580
    
    STACK_TEXT:  
    fffff880`0a18e2d8 fffff800`0307eae9 : 00000000`0000000a fffffa80`2bd80008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`0a18e2e0 fffff800`0307d760 : 00000000`00000001 fffffa80`2bd80008 fffff8a0`14b01c00 fffffa80`0c53b780 : nt!KiBugCheckDispatch+0x69
    fffff880`0a18e420 fffff800`03140607 : fffff8a0`14b01c80 fffffa80`0c53b780 fffffa80`0bac9d80 fffff8a0`14b01cb8 : nt!KiPageFault+0x260
    fffff880`0a18e5b0 fffff800`030fb1d8 : ffffffff`00000080 01000000`0000000c 00000000`000000c0 00000000`03000000 : nt!MiReleaseConfirmedPageFileSpace+0x87
    fffff880`0a18e630 fffff800`030c8254 : 00000000`00000000 00000000`0307ffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2a628
    fffff880`0a18e7f0 fffff800`0307e7d3 : ffffffff`ffffffff fffffa80`0c53b780 00000000`00000000 00000000`00008000 : nt!NtFreeVirtualMemory+0x9d4
    fffff880`0a18e900 fffff800`0307ad70 : fffff800`0330f0cf fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`0a18ea98 fffff800`0330f0cf : fffffa80`0b099b30 fffffa80`0c53b780 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
    fffff880`0a18eaa0 fffff800`03364022 : 00000000`03000000 00000000`00000000 00000000`00000000 fffffa80`0ba23e60 : nt!RtlFreeUserStack+0x27
    fffff880`0a18ead0 fffff800`03367ae1 : 00000000`00000000 00000000`00000000 000007ff`fffa0000 00000000`00000000 : nt!PspExitThread+0x7ae
    fffff880`0a18eb90 fffff800`03367da9 : fffffa80`0c53b780 00000000`00000000 fffffa80`0c53b780 000007ff`fffdf000 : nt!PspTerminateThreadByPointer+0x4d
    fffff880`0a18ebe0 fffff800`0307e7d3 : fffffa80`0c53b780 fffff880`0a18eca0 00000000`77225270 00000000`0199f301 : nt!NtTerminateThread+0x45
    fffff880`0a18ec20 00000000`7716fbea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0307f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7716fbea
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03140607 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+87
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc792b2
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041611-25786-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
    Machine Name:
    Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`03293eb0
    Debug session time: Sat Apr 16 19:13:06.376 2011 (UTC - 4:00)
    System Uptime: 0 days 0:06:38.702
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa802b280008, 2, 1, fffff80003186607}
    
    Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+87 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa802b280008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003186607, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fe0e0
     fffffa802b280008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    LAST_CONTROL_TRANSFER:  from fffff800030c4ae9 to fffff800030c5580
    
    STACK_TEXT:  
    fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
    fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
    fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
    fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+87
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc792b2
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa802b280008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003186607, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS:  fffffa802b280008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    LAST_CONTROL_TRANSFER:  from fffff800030c4ae9 to fffff800030c5580
    
    STACK_TEXT:  
    fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
    fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
    fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
    fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+87
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc792b2
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa802b280008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003186607, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS:  fffffa802b280008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    LAST_CONTROL_TRANSFER:  from fffff800030c4ae9 to fffff800030c5580
    
    STACK_TEXT:  
    fffff880`084f0f28 fffff800`030c4ae9 : 00000000`0000000a fffffa80`2b280008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`084f0f30 79a60000`02f25000 : 00000000`64a664fc fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 : nt!KiBugCheckDispatch+0x69
    fffff880`084f1070 00000000`64a664fc : fffffa80`2b280008 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff : 0x79a60000`02f25000
    fffff880`084f1078 fffffa80`2b280008 : 00000000`00000000 fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 : 0x64a664fc
    fffff880`084f1080 00000000`00000000 : fffffa80`0777ab60 ffffffff`ffffffff 00001f80`010142e1 fffffa80`0b280010 : 0xfffffa80`2b280008
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+87
    fffff800`03186607 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+87
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc792b2
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+87
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041811-38142-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.20826.amd64fre.win7_ldr.101026-1502
    Machine Name:
    Kernel base = 0xfffff800`0301b000 PsLoadedModuleList = 0xfffff800`0324feb0
    Debug session time: Mon Apr 18 02:35:08.116 2011 (UTC - 4:00)
    System Uptime: 1 days 3:50:06.890
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .........................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800031b70bf, fffff8800d727dd0, 0}
    
    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+233 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff800031b70bf, Address of the instruction which caused the bugcheck
    Arg3: fffff8800d727dd0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExDeferredFreePool+233
    fffff800`031b70bf 4c395008        cmp     qword ptr [rax+8],r10
    
    CONTEXT:  fffff8800d727dd0 -- (.cxr 0xfffff8800d727dd0)
    rax=0000000000000000 rbx=0000000000000042 rcx=fffff88003f990f0
    rdx=fffff900c35b6000 rsi=0000000000000000 rdi=fffff900c07f8db0
    rip=fffff800031b70bf rsp=fffff8800d7287a0 rbp=0000000000000000
     r8=2680914e1b9c2500  r9=fffff900c35b62c0 r10=fffff900c35b62d0
    r11=0000000000000001 r12=fffff88003f98cc0 r13=0000000000000000
    r14=000000000000001c r15=0000000000000001
    iopl=0         nv up ei ng nz ac po cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
    nt!ExDeferredFreePool+0x233:
    fffff800`031b70bf 4c395008        cmp     qword ptr [rax+8],r10 ds:002b:00000000`00000008=????????????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  pidgin.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800031b70bf
    
    STACK_TEXT:  
    fffff880`0d7287a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x233
    
    
    FOLLOWUP_IP: 
    nt!ExDeferredFreePool+233
    fffff800`031b70bf 4c395008        cmp     qword ptr [rax+8],r10
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExDeferredFreePool+233
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    STACK_COMMAND:  .cxr 0xfffff8800d727dd0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+233
    
    BUCKET_ID:  X64_0x3B_nt!ExDeferredFreePool+233
    
    Followup: Pool_corruption
    ---------
    
    
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00e00000 fffff880`00e57000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02e7e000 fffff880`02f08000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`04400000 fffff880`04416000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`0150c000 fffff880`01517000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`03d5d000 fffff880`03d65000   ASMMAP64 ASMMAP64.sys Thu Jul 02 05:13:26 2009 (4A4C7A36)
    fffff880`0a9d6000 fffff880`0a9e1000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`014ce000 fffff880`014d7000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`014d7000 fffff880`01501000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`04477000 fffff880`04704000   athrx    athrx.sys    Sat Nov 13 23:32:38 2010 (4CDF6666)
    fffff880`047db000 fffff880`047e3000   ATK64AMD ATK64AMD.sys Tue May 12 21:04:54 2009 (4A0A1CB6)
    fffff960`00910000 fffff960`00971000   ATMFD    ATMFD.DLL    unavailable (00000000)
    fffff880`00ec8000 fffff880`00ed4000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`042f7000 fffff880`042fe000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`043c0000 fffff880`043d1000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`07fbc000 fffff880`07fda000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
    fffff960`00710000 fffff960`00737000   cdd      cdd.dll      unavailable (00000000)
    fffff880`0555a000 fffff880`05577000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
    fffff880`04293000 fffff880`042bd000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cfd000 fffff880`00dbd000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`0119b000 fffff880`011cb000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c9f000 fffff880`00cfd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`047b7000 fffff880`047bb500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01200000 fffff880`01273000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00ebf000 fffff880`00ec8000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`047e3000 fffff880`047f3000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0521e000 fffff880`0522c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`043a2000 fffff880`043c0000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`04393000 fffff880`043a2000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`019e7000 fffff880`019fd000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`054d2000 fffff880`054f4000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`03c73000 fffff880`03c86000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03a6b000 fffff880`03c73000   dump_iaStor dump_iaStor.sys Thu Dec 17 13:41:59 2009 (4B2A7B77)
    fffff880`05591000 fffff880`0559d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`10ca3000 fffff880`10d97000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
    fffff880`10da7000 fffff880`10ded000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
    fffff880`04746000 fffff880`0476b000   ETD      ETD.sys      Wed Jul 21 03:45:17 2010 (4C46A58D)
    fffff880`03d65000 fffff880`03d9b000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`01563000 fffff880`01577000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01517000 fffff880`01563000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`0162b000 fffff880`01635000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    fffff880`01161000 fffff880`0119b000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01273000 fffff880`012bd000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`035ef000 fffff800`03638000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`09b20000 fffff880`09b44000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`09aa8000 fffff880`09ab9000   HECIx64  HECIx64.sys  Thu Sep 17 15:54:16 2009 (4AB293E8)
    fffff880`0a4b4000 fffff880`0a4cd000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`055df000 fffff880`055e7080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`0a4a6000 fffff880`0a4b4000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`07ef4000 fffff880`07fbc000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`019de000 fffff880`019e7000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`04728000 fffff880`04746000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`012c6000 fffff880`014ce000   iaStor   iaStor.sys   Thu Dec 17 13:41:59 2009 (4B2A7B77)
    fffff880`09085000 fffff880`09aa7e20   igdkmd64 igdkmd64.sys Fri Feb 11 14:16:32 2011 (4D558B10)
    fffff880`04791000 fffff880`047b6180   Impcd    Impcd.sys    Mon Oct 26 16:39:41 2009 (4AE6090D)
    fffff880`054fa000 fffff880`0553b000   IntcDAud IntcDAud.sys Fri Oct 30 10:56:33 2009 (4AEAFEA1)
    fffff880`047c5000 fffff880`047db000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`04782000 fffff880`04791000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0477a000 fffff880`04782000   kbfiltr  kbfiltr.sys  Mon Jul 20 05:21:42 2009 (4A643726)
    fffff800`00bd4000 fffff800`00bde000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
    fffff880`0902f000 fffff880`09072000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01600000 fffff880`0161a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01999000 fffff880`019c4000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`054f4000 fffff880`054f9200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`0a299000 fffff880`0a2ae000   L1C62x64 L1C62x64.sys Fri Nov 13 04:47:36 2009 (4AFD2B38)
    fffff880`03cca000 fffff880`03cdf000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`047f3000 fffff880`047fa000   lmimirr  lmimirr.sys  Tue Apr 10 18:32:45 2007 (461C108D)
    fffff880`07ebf000 fffff880`07ed2000   LMIRfsDriver LMIRfsDriver.sys Mon Jul 14 12:26:56 2008 (487B7E50)
    fffff880`03c86000 fffff880`03ca9000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`09b9a000 fffff880`09bd6880   mcdbus   mcdbus.sys   Tue Feb 24 05:34:07 2009 (49A3CD1F)
    fffff880`00c47000 fffff880`00c8b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`0a53d000 fffff880`0a54b000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0476b000 fffff880`0477a000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0a4cd000 fffff880`0a4da000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`010fb000 fffff880`01115000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`042bd000 fffff880`042ee000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`07ea8000 fffff880`07eb8000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`07fda000 fffff880`07ff2000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`07e00000 fffff880`07e2d000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
    fffff880`07e2d000 fffff880`07e7b000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
    fffff880`07e7b000 fffff880`07e9e000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
    fffff880`01501000 fffff880`0150c000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`0434c000 fffff880`04357000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e60000 fffff880`00e6a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`0a3a9000 fffff880`0a3aaa80   MSPQM    MSPQM.sys    Mon Jul 13 20:00:17 2009 (4A5BCA91)
    fffff880`01577000 fffff880`015d5000   msrpc    msrpc.sys    unavailable (00000000)
    fffff880`02e71000 fffff880`02e7c000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019cc000 fffff880`019de000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01847000 fffff880`01939000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`0443a000 fffff880`04446000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03d32000 fffff880`03d45000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`04446000 fffff880`04475000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`09bd7000 fffff880`09bec000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02f92000 fffff880`02fa1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02f08000 fffff880`02f4d000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01939000 fffff880`01999000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`0a91f000 fffff880`0a934000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`04357000 fffff880`04368000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02e65000 fffff880`02e71000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`0301b000 fffff800`035ef000   nt       ntkrnlmp.exe Tue Oct 26 22:47:14 2010 (4CC792B2)
    fffff880`0164d000 fffff880`017f0000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`042ee000 fffff880`042f7000   Null     Null.SYS     unavailable (00000000)
    fffff880`10ca1000 fffff880`10ca2180   nvBridge nvBridge.kmd Thu Mar 17 03:58:02 2011 (4D81BF0A)
    fffff880`10045000 fffff880`10ca0300   nvlddmkm nvlddmkm.sys Thu Mar 17 04:08:59 2011 (4D81C19B)
    fffff880`0183a000 fffff880`0183e980   nvpciflt nvpciflt.sys Thu Mar 17 04:09:43 2011 (4D81C1C7)
    fffff880`03cdf000 fffff880`03d32000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02f56000 fffff880`02f7c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00eaa000 fffff880`00ebf000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e6a000 fffff880`00e9d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`010e4000 fffff880`010eb000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`010eb000 fffff880`010fb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0161a000 fffff880`0162b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08e1d000 fffff880`08ec3000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`05200000 fffff880`05210000   point64  point64.sys  Tue Dec 14 06:09:25 2010 (4D075065)
    fffff880`05495000 fffff880`054d2000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00c8b000 fffff880`00c9f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`07eb8000 fffff880`07ebf000   RaInfo   RaInfo.sys   Fri Jan 04 13:57:14 2008 (477E818A)
    fffff880`04416000 fffff880`0443a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`09b44000 fffff880`09b5f000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`09b5f000 fffff880`09b80000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`09b80000 fffff880`09b9a000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02e14000 fffff880`02e65000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`04331000 fffff880`0433a000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0433a000 fffff880`04343000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04343000 fffff880`0434c000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`01800000 fffff880`0183a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`03d45000 fffff880`03d5d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`05273000 fffff880`05494080   RTKVHD64 RTKVHD64.sys Tue Jan 12 05:14:27 2010 (4B4C4B83)
    fffff880`09000000 fffff880`0902f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`08ec3000 fffff880`08ece000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`05588000 fffff880`05590a80   sncduvc  sncduvc.SYS  Mon Dec 29 04:14:26 2008 (495894F2)
    fffff880`0405a000 fffff880`04211600   snp2uvc  snp2uvc.sys  Wed May 20 04:11:05 2009 (4A13BB19)
    fffff880`019c4000 fffff880`019cc000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0a88a000 fffff880`0a91f000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
    fffff880`08f0d000 fffff880`08f74000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
    fffff880`08ece000 fffff880`08efb000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
    fffff880`05577000 fffff880`05587d00   STREAM   STREAM.SYS   Mon Jul 13 20:06:18 2009 (4A5BCBFA)
    fffff880`04475000 fffff880`04476480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01a00000 fffff880`01bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`08efb000 fffff880`08f0d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`04386000 fffff880`04393000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`04368000 fffff880`04386000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02e00000 fffff880`02e14000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`02fbc000 fffff880`02ffd000   truecrypt truecrypt.sys Sun Sep 05 10:23:16 2010 (4C83A7D4)
    fffff960`00400000 fffff960`0040a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`043d1000 fffff880`043f7000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`09072000 fffff880`09084000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0553b000 fffff880`05558000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`05558000 fffff880`05559f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`09ab9000 fffff880`09aca000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04000000 fffff880`0405a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`09aca000 fffff880`09b20000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0559d000 fffff880`055b8000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
    fffff880`00e9d000 fffff880`00eaa000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`042fe000 fffff880`0430c000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0430c000 fffff880`04331000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00ed4000 fffff880`00ee9000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01088000 fffff880`010e4000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01115000 fffff880`01161000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0a321000 fffff880`0a32e000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02f7c000 fffff880`02f92000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`02fa1000 fffff880`02fbc000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`10d97000 fffff880`10da7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00efb000 fffff880`00f9f000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f9f000 fffff880`00fae000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02f4d000 fffff880`02f56000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000b0000 fffff960`003c2000   win32k   win32k.sys   unavailable (00000000)
    fffff880`047bc000 fffff880`047c5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00e57000 fffff880`00e60000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`03ca9000 fffff880`03cca000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`0a32e000 fffff880`0a338000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a934000 fffff880`0a965000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00031000
    fffff880`0a30a000 fffff880`0a317000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a317000 fffff880`0a321000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a2f3000 fffff880`0a300000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a300000 fffff880`0a30a000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a2dc000 fffff880`0a2e9000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04602000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0018B000
    fffff880`0a2e9000 fffff880`0a2f3000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a2c5000 fffff880`0a2d2000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a2d2000 fffff880`0a2dc000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a2ae000 fffff880`0a2bb000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a2bb000 fffff880`0a2c5000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a271000 fffff880`0a27e000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a27e000 fffff880`0a288000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a5bc000 fffff880`0a5d1000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a288000 fffff880`0a291000   cpuz135_x64.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`0a291000 fffff880`0a299000   600ee967-0bf
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`0a5d1000 fffff880`0a5de000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`04477000 fffff880`04704000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0028D000
    fffff880`0a5de000 fffff880`0a5e8000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a200000 fffff880`0a271000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0a54b000 fffff880`0a5bc000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`0a37d000 fffff880`0a38a000   vwifibus.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0a200000 fffff880`0a37d000   athrx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0017D000
    fffff880`0a38a000 fffff880`0a394000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0a519000 fffff880`0a52e000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a504000 fffff880`0a519000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a4ef000 fffff880`0a504000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a4da000 fffff880`0a4ef000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a394000 fffff880`0a3a9000   L1C62x64.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`0a3ad000 fffff880`0a3af000   MSPCLOCK.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    fffff880`0a480000 fffff880`0a499000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`0a472000 fffff880`0a480000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0a499000 fffff880`0a4a6000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0a44c000 fffff880`0a465000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`0a43e000 fffff880`0a44c000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0a465000 fffff880`0a472000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0a418000 fffff880`0a431000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`0a40a000 fffff880`0a418000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0a431000 fffff880`0a43e000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0a3e4000 fffff880`0a3fd000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    fffff880`0a3d6000 fffff880`0a3e4000   hidusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0a3fd000 fffff880`0a40a000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    fffff880`0a3bd000 fffff880`0a3d6000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00019000
    
    
     
  3. siren

    siren New Member

    Joined:
    Apr 18, 2011
    Messages:
    4
    Likes Received:
    0
    Thank you for the response!

    This is my first time trying to change the RAM settings, but it appears that I don't have access to these options in the BIOS. The BIOS options seem very limited for this laptop. :S

    By "uninstall Intel Turbo Boost", do you mean uninstall the Intel Turbo Boost driver? That's the only Intel Turbo Boost I can find on this computer. I disabled that; is it safe to uninstall? Furthermore, I disabled the Asus Turbo 33 technology that is supposed to work with Intel Turbo Boost. This gave me new CPU-Z readings, as attached (sorry about being unknowledgable about RAM settings, but the new settings aren't the ones you advised).

    Fortunately, I have not had any blue screens since; however, I was wondering what I should do about the RAM.
     

    Attached Files:

  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    What you got now is 800 Mhz 6-6-6-15
    should be: 1333 Mhz 9-9-9-24 1.5v


    ~~~~~~~~~~


    Yes, that's precisely what I mean: by "uninstall" I mean to uninstall rather than to just disable. This driver:

    Impcd.sys Mon Oct 26 16:39:41 2009

    Is it safe to uninstall ? Yes, it is.


    So if you have updated all the drivers listed in my 1st post but nonetheless keep getting blue screens, uninstall ASUS/Intel Turbo Boost, reboot and see your new CPU-Z memory settings. If wrong again, look in the bios for the option fail-safe/optimized/setup defaults, or an option to that meaning. Load setup defaults, save, and reboot.
     

Share This Page

Loading...