Windows 7 BSD (#0000001A, #00000034, #00000050, #0000003B)

Test results:
Tried one by one / different slot / also different combinations of 2.

All tests passes (10+ passes per combination).

Now what? :)
 
Recent minidumps:
Link Removed due to 404 Error
Link Removed due to 404 Error
Link Removed due to 404 Error
Link Removed due to 404 Error

CPUZ:
Link Removed due to 404 Error
Link Removed due to 404 Error
Link Removed due to 404 Error
Link Removed due to 404 Error


When i start RAMMon i get BSOD:
View attachment 031911-34367-01.dmp


I'm thinking to install fresh windows...
 

Attachments

  • Capture.PNG
    Capture.PNG
    24.2 KB · Views: 990
DISABLE DRIVER VERIFIER.


Memory is set right 8 8 8 24 1600mhz.
The sticks are identical which is very good.

Test results:
Tried one by one / different slot / also different combinations of 2.

All tests passes (10+ passes per combination).

This also sounds good. And you also mentioned running 20 passes before.


Error codes:
#0000001A,
#00000034,
#00000050,
#0000003B
Caused by : system files and memory_corruption


Now the question is: what causes your blue screens?
I would blame bios settings, but you report everything is set right there, and the memory is also set right and passes all the tests.

What I would try is bios upgrade. If bios doesn't help, I'd get a new motherboard.



~~~~~~


Your crash dump is not readable:




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\031911-34367-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Unable to load image Unknown_Module_00000000`00000001, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
Debug session time: Sat Mar 19 09:35:59.424 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:35.454
Unable to load image Unknown_Module_00000000`00000001, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Debugger can not determine kernel base address
Loading Kernel Symbols
.
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {f6, 148, fffffa8007a54b30, fffff88007b191e0}

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.

*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught.  This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 0000000000000148, Handle value being referenced.
Arg3: fffffa8007a54b30, Address of the current process.
Arg4: fffff88007b191e0, Address inside the driver that is performing the incorrect reference.

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


BUGCHECK_STR:  0xc4_f6

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002a9124a to fffff88003f909c2

STACK_TEXT:  
fffff800`00b9cc98 fffff800`02a9124a : 00000000`0027d3e2 fffffa80`073758d8 00000000`00000000 00000000`00000000 : 0xfffff880`03f909c2
fffff800`00b9cca0 00000000`0027d3e2 : fffffa80`073758d8 00000000`00000000 00000000`00000000 fffff800`02bfde80 : 0xfffff800`02a9124a
fffff800`00b9cca8 fffffa80`073758d8 : 00000000`00000000 00000000`00000000 fffff800`02bfde80 fffff800`02a8ecb7 : 0x27d3e2
fffff800`00b9ccb0 00000000`00000000 : 00000000`00000000 fffff800`02bfde80 fffff800`02a8ecb7 00000000`183d965b : 0xfffffa80`073758d8


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  CORRUPT_MODULELIST
 
Oh, i forgot on important thing.

When i put only one stick in motherboard, computer didn't booted with XMP settings...

Thanks,
Grega
 
You'll be crashing non-stop for as long as the verifier is on. Disable it by typing in the command prompt: -> Verifier /reset.
 
Yes, you can quite blame the verifier for your recent crashes. Empty the minidump folder now, then if you get any crashes while the verifier is disabled -- attach them.
 
RAM it is, again:



032611-24367-01.dmp
BugCheck 1E, {ffffffffc0000005, fffff80002ae0b7f, 0, ffffffffffffffff}

Stack text:

nt!KiPageFault
nt!MmAccessFault
nt!MiResolveDemandZeroFault
nt!MiRemoveAnyPage
nt!MiReplenishPageSlist

....

Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )







CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\032611-24367-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a4b000 PsLoadedModuleList = 0xfffff800`02c88e50
Debug session time: Sat Mar 26 12:20:59.420 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:15.451
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002ae0b7f, 0, ffffffffffffffff}

Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ae0b7f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiReplenishPageSlist+100
fffff800`02ae0b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf30e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88007867618 -- (.exr 0xfffff88007867618)
ExceptionAddress: fffff80002ae0b7f (nt!MiReplenishPageSlist+0x0000000000000100)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880078676c0 -- (.trap 0xfffff880078676c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000041000008839b rbx=0000000000000000 rcx=fdffffffffffffff
rdx=000000000000004b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae0b7f rsp=fffff88007867850 rbp=fffffa8005400438
 r8=fffff80002cf5400  r9=fffffa8005400000 r10=fffffa8005400458
r11=fffff880078678a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiReplenishPageSlist+0x100:
fffff800`02ae0b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0 ds:2354:00000000`00000010=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002af5a39 to fffff80002abb740

STACK_TEXT:  
fffff880`07866e48 fffff800`02af5a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02ae0b7f 00000000`00000000 : nt!KeBugCheckEx
fffff880`07866e50 fffff800`02abad82 : fffff880`07867618 000c2a80`0198ad10 fffff880`078676c0 00000000`00000008 : nt!KiDispatchException+0x1b9
fffff880`078674e0 fffff800`02ab968a : fffffa80`059a4140 00000000`00001000 00000000`00000000 00000000`00001000 : nt!KiExceptionDispatch+0xc2
fffff880`078676c0 fffff800`02ae0b7f : fffff880`07867848 00000000`00000000 00000000`00000000 fffff6fb`80008590 : nt!KiGeneralProtectionFault+0x10a
fffff880`07867850 fffff800`02ae10af : fffff800`02cf5400 00000000`0000001b fffffa80`01999d10 fffffa80`01998510 : nt!MiReplenishPageSlist+0x100
fffff880`078678b0 fffff800`02ad92c7 : 00000000`00000002 fffff880`00000002 fffffa80`07f35ec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`078679d0 fffff800`02ad59c6 : 00000000`00000001 00000000`0ca5c000 fffff880`07867c20 fffff680`000652e0 : nt!MiResolveDemandZeroFault+0x577
fffff880`07867ac0 fffff800`02ab982e : 00000000`00000001 00000000`00000000 00000000`03b2e301 00000000`00000001 : nt!MmAccessFault+0x5c6
fffff880`07867c20 00000000`68b37037 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0449f750 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x68b37037


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiReplenishPageSlist+100
fffff800`02ae0b7f f00fba6b1000    lock bts dword ptr [rbx+10h],0

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!MiReplenishPageSlist+100

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!MiReplenishPageSlist+100

BUCKET_ID:  X64_0x1E_c0000005_nt!MiReplenishPageSlist+100

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`04856000 fffff880`04894000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f93000 fffff880`00fea000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0183c000 fffff880`018c6000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04894000 fffff880`048aa000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`042de000 fffff880`042e6000   ASACPI   ASACPI.sys   Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`0751b000 fffff880`07526000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00dee000 fffff880`00df7000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`048e0000 fffff880`051dc000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03d76000 fffff880`03dc4000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff960`008e0000 fffff960`00941000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`01989000 fffff880`01990000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d29000 fffff880`03d3a000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03fba000 fffff880`03fd8000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00600000 fffff960`00627000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`00d14000 fffff880`00dd4000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018f0000 fffff880`01920000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cb6000 fffff880`00d14000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01144000 fffff880`011b7000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043f0000 fffff880`04400000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0574e000 fffff880`0575c000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c88000 fffff880`03d0b000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d0b000 fffff880`03d29000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`00c35000 fffff880`00c4b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05726000 fffff880`05748000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05768000 fffff880`05771000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0575c000 fffff880`05768000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05771000 fffff880`05784000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05784000 fffff880`05790000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`042fc000 fffff880`043f0000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04200000 fffff880`04246000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`010d2000 fffff880`010e6000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01086000 fffff880`010d2000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011b7000 fffff880`011f1000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a02000 fffff800`02a4b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04246000 fffff880`0426a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0568d000 fffff880`056e9000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`057bd000 fffff880`057d6000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`057d6000 fffff880`057de080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`057af000 fffff880`057bd000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`03ef2000 fffff880`03fba000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`014ed000 fffff880`014f6000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03d60000 fffff880`03d76000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03c3b000 fffff880`03c4a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`057df000 fffff880`057ed000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bca000 fffff800`00bd4000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`02c77000 fffff880`02cba000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01200000 fffff880`0121a000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05748000 fffff880`0574d200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03c6b000 fffff880`03c80000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`01920000 fffff880`01935000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02db6000 fffff880`02dca000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`02dca000 fffff880`02ded000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c5e000 fffff880`00ca2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`057ed000 fffff880`057fb000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03c4a000 fffff880`03c59000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03df3000 fffff880`03e00000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dd4000 fffff880`00dee000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03fd8000 fffff880`03ff0000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03e00000 fffff880`03e2d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`03e2d000 fffff880`03e7b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`03e7b000 fffff880`03e9e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019ee000 fffff880`019f9000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ff3000 fffff880`00ffd000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010e6000 fffff880`01144000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01235000 fffff880`01247000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014fe000 fffff880`015f0000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`042ef000 fffff880`042fb000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03dc4000 fffff880`03df3000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05678000 fffff880`0568d000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d37000 fffff880`02d46000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cc3000 fffff880`02d08000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a4b000 fffff800`03028000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0124b000 fffff880`013ee000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01980000 fffff880`01989000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d11000 fffff880`02d37000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ec6000 fffff880`00ecd000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ecd000 fffff880`00edd000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06e2b000 fffff880`06ed1000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`056e9000 fffff880`05726000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca2000 fffff880`00cb6000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`048aa000 fffff880`048ce000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`051dc000 fffff880`051f7000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03c00000 fffff880`03c21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03c21000 fffff880`03c3b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`048ce000 fffff880`048d9000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019d3000 fffff880`019dc000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019dc000 fffff880`019e5000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e5000 fffff880`019ee000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01935000 fffff880`0194d000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04800000 fffff880`04856000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
fffff880`06ed1000 fffff880`06edc000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`014e5000 fffff880`014ed000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`074aa000 fffff880`0751b000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`07414000 fffff880`074aa000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06f1b000 fffff880`06f82000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06edc000 fffff880`06f09000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`048d9000 fffff880`048da480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06f09000 fffff880`06f1b000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182f000 fffff880`0183c000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01811000 fffff880`0182f000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02da2000 fffff880`02db6000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`02d61000 fffff880`02da2000   truecrypt truecrypt.sys Sun Sep 05 10:23:16 2010 (4C83A7D4)
fffff960`004a0000 fffff960`004aa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03d3a000 fffff880`03d60000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03c59000 fffff880`03c6b000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05790000 fffff880`057ad000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`057ad000 fffff880`057aef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`042cd000 fffff880`042de000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0561e000 fffff880`05678000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04277000 fffff880`042cd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05600000 fffff880`0561b000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`0426a000 fffff880`04277000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01990000 fffff880`0199e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0199e000 fffff880`019c3000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`014d5000 fffff880`014e5000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e6a000 fffff880`00ec6000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d46000 fffff880`02d61000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019c3000 fffff880`019d3000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ee0000 fffff880`00f84000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f84000 fffff880`00f93000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d08000 fffff880`02d11000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00000000 fffff960`00310000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`07526000 fffff880`07537000   WinUsb   WinUsb.sys   Mon Jul 13 20:06:28 2009 (4A5BCC04)
fffff880`042e6000 fffff880`042ef000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fea000 fffff880`00ff3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`018c6000 fffff880`018e7000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`07537000 fffff880`07568000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`01920000 fffff880`0192e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0192e000 fffff880`0193a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0193a000 fffff880`01943000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01943000 fffff880`01956000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`01956000 fffff880`01980000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002A000
 
Any other idea what should i try?

Should i try with system format? It's easy for me to try this.


Cheers,
Grega
 
Yea, feel free to reformat and reinstall. Then something tells me it'll crash again, and in that case get new matching pair of RAM sticks compatible with your motherboard.
 
That's not your case, your problem is memory_corruption:



#0000001A,
#00000034,
#00000050,
#0000003B



Probably caused by : fileinfo.sys ( fileinfo!FIStreamGetInfo+11f )
Probably caused by : dxgkrnl.sys ( dxgkrnl!DoublyLinkedList<DMMVIDPNSOURCEMODE>DoublyLinkedList<DMMVIDPNSOURCEMODE>+c0 )
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6a8 )
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Probably caused by : memory_corruption
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Probably caused by : Ntfs.sys ( Ntfs! ?? ::NNGAKEGL::`string'+3690 )
Probably caused by : memory_corruption ( nt!MiRemoveLowestPriorityStandbyPage+24b )

022811-47283-01.dmp
BugCheck 34, {50830, fffff88003346488, fffff88003345cf0, fffff80002a9acd8}
CACHE_MANAGER (34)
PROCESS_NAME: System
Srack: nt
EXCEPTION_RECORD: fffff88003346488 -- (.exr 0xfffff88003346488)
ExceptionAddress: fffff80002a9acd8 (nt!MiUnlinkPageFromLockedList+0x00000000000006a8)
ExceptionCode: c0000005 (Access violation)
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
ffffffffffffffff
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6a8 )





022811-29078-01.dmp
BugCheck 50, {fffffa7fcc554b60, 1, fffff88004377d8b, 7}
PAGE_FAULT_IN_NONPAGED_AREA (50)
PROCESS_NAME: System
Srack: nt
Probably caused by : memory_corruption





031511-17893-01.dmp
BugCheck 1E, {ffffffffc0000005, fffff80002aaad18, 0, ffffffffffffffff}
KMODE_EXCEPTION_NOT_HANDLED (1e)
PROCESS_NAME: svchost.exe
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+2a2 )


031511-18626-01.dmp
BugCheck 3B, {c0000005, fffff80002ad4e1e, fffff880094b2850, 0}
SYSTEM_SERVICE_EXCEPTION (3b)
PROCESS_NAME: chrome.exe
Probably caused by : memory_corruption ( nt!MiDeletePteList+18e )


HDDScan

HD Tune website

Link Removed - Invalid URL


If the hard disk is Ok, then replace RAM for sure. You have already run memtest and the RAM settings look right. You may also want to upgrade bios to the latest. Of course try SP1, but I guess it won't fix memory corruption.
 
Thanks! I will test my disk today.

Meantime i have another question, related to rams.

At this link:
Link Removed - Invalid URL

.. i found, that CPU frequency should be twice as RAM frequency.

In my case i have RAMs at 1600Mhz and CPU at 2667Mhz.

Should i set RAM frequency to 1333Mhz?

Thanks again for your help - i really appreciate that!
Grega
 
Memory must be:

a) supported by the motherboard
b) the sticks should be identical and set as specified by the RAM maker
 
Back
Top