bsod help

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by toink, Feb 3, 2011.

  1. toink

    toink New Member

    Joined:
    Feb 3, 2011
    Messages:
    12
    Likes Received:
    0
    i'm been getting bsod since i changed my mobo, i reformatted my main drive so there shouldn't be any problem, but i get random BSOD from time to time, i also tried installing windbg but it get stuck somewhere like unloading symbols...

    attached is my minidumps TIA
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Hello and Welcome,

    please also attach CPU-Z snips of MEMORY AND SPD tabs for each slot of RAM.
     
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    BCcode: 1a, 4e. RAM is most likely set wrong.

    1. Load setup defaults in the bios, save, and reboot.

    2.

    3. The only old driver you got is RTCore 2005, you may want to uninstall it for now.




    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020111-18470-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x8340d000 PsLoadedModuleList = 0x83557850
    Debug session time: Tue Feb  1 09:08:05.338 2011 (UTC - 5:00)
    System Uptime: 0 days 1:10:02.179
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 00008886, The subtype of the bugcheck.
    Arg2: 857e7cac
    Arg3: 857e8470
    Arg4: 00000504
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_8886
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 8349acd2 to 834ebf20
    
    STACK_TEXT:  
    a71d0be4 8349acd2 0000001a 00008886 857e7cac nt!KeBugCheckEx+0x1e
    a71d0c24 8349ea91 00000000 87c38030 00000000 nt!MiUnlinkPageFromLockedList+0x51
    a71d0c90 8349d8ed 0b7d4d6e 00000000 87a96f30 nt!MiDispatchFault+0x2fa
    a71d0d1c 8344e3d8 00000000 0b7d4d6e 00000001 nt!MmAccessFault+0x25cc
    a71d0d1c 77af9b69 00000000 0b7d4d6e 00000001 nt!KiTrap0E+0xdc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0e20e9f0 00000000 00000000 00000000 00000000 0x77af9b69
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiUnlinkPageFromLockedList+51
    8349acd2 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+51
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromLockedList+51
    
    BUCKET_ID:  0x1a_8886_nt!MiUnlinkPageFromLockedList+51
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020111-18673-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x83401000 PsLoadedModuleList = 0x8354b850
    Debug session time: Tue Feb  1 07:57:20.413 2011 (UTC - 5:00)
    System Uptime: 0 days 3:34:42.129
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ...........
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 00000403, The subtype of the bugcheck.
    Arg2: c00510a0
    Arg3: 255e1867
    Arg4: c001fce0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_403
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 834a0cc9 to 834a20be
    
    STACK_TEXT:  
    a44bfa24 834a0cc9 c00510a0 c0051ff8 862f3030 nt!MiDeletePteRun+0x663
    a44bfb2c 834bbaeb 0a100000 0a83efff 8e6b7ca0 nt!MiDeleteVirtualAddresses+0x3c1
    a44bfbc4 8343f1ea ffffffff a44bfce8 a44bfcf4 nt!NtFreeVirtualMemory+0x60b
    a44bfbc4 8343d1a1 ffffffff a44bfce8 a44bfcf4 nt!KiFastCallEntry+0x12a
    a44bfc4c 9a54ab1c ffffffff a44bfce8 a44bfcf4 nt!ZwFreeVirtualMemory+0x11
    a44bfcec 9a54a87a 00000000 00000000 00000000 win32k!SURFACE::bDeleteSurface+0x291
    a44bfd00 9a534e43 00000000 00000000 fe1a3b48 win32k!SURFREF::bDeleteSurface+0x14
    a44bfd14 9a5301bd d00518a8 0018f400 d00518a8 win32k!bDeleteSurface+0x20
    a44bfd28 8343f1ea d00518a8 0018f414 772a70b4 win32k!NtGdiDeleteObjectApp+0x7f
    a44bfd28 772a70b4 d00518a8 0018f414 772a70b4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0018f414 00000000 00000000 00000000 00000000 0x772a70b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!SURFACE::bDeleteSurface+291
    9a54ab1c e98f000000      jmp     win32k!SURFACE::bDeleteSurface+0x325 (9a54abb0)
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  win32k!SURFACE::bDeleteSurface+291
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7900f
    
    FAILURE_BUCKET_ID:  0x1a_403_win32k!SURFACE::bDeleteSurface+291
    
    BUCKET_ID:  0x1a_403_win32k!SURFACE::bDeleteSurface+291
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020211-18735-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0x83408000 PsLoadedModuleList = 0x83552850
    Debug session time: Wed Feb  2 00:22:40.205 2011 (UTC - 5:00)
    System Uptime: 0 days 0:02:43.046
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    .....
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 00000099, A PTE or PFN is corrupt
    Arg2: 00010e09, page frame number
    Arg3: 00000002, current page state
    Arg4: 0002d1cd, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  ekrn.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 834f2513 to 834e6f20
    
    STACK_TEXT:  
    9eafe748 834f2513 0000004e 00000099 00010e09 nt!KeBugCheckEx+0x1e
    9eafe760 834c768d c0802000 9eafe808 87e4ea68 nt!MiBadShareCount+0x24
    9eafe7ac 834c77af 87e4e878 87f36030 87e4e878 nt!MiDeletePfnList+0x312
    9eafec14 834c640b 87e4e878 87e4e878 00000000 nt!MiDeleteAddressesInWorkingSet+0x118
    9eafec40 83672710 b4ba359c 87f36030 c0000096 nt!MmCleanProcessAddressSpace+0x8c
    9eafecb4 83686051 00000000 86cac978 00000001 nt!PspExitThread+0x685
    9eafeccc 834b98c0 86cac978 9eafecf8 9eafed04 nt!PsExitSpecialApc+0x22
    9eafed1c 834462a4 00000001 00000000 9eafed34 nt!KiDeliverApc+0x28b
    9eafed1c 76fd70b4 00000001 00000000 9eafed34 nt!KiServiceExit+0x64
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0186fe70 00000000 00000000 00000000 00000000 0x76fd70b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+24
    834f2513 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+24
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78a09
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount+24
    
    BUCKET_ID:  0x4E_99_nt!MiBadShareCount+24
    
    Followup: MachineOwner
    ---------
    
    
    



    Drivers:

    Code:
    start    end        module name
    83bad000 83bf5000   ACPI     ACPI.sys     Sat Nov 20 03:37:52 2010 (4CE788E0)
    92a00000 92a37000   ae0e9xji ae0e9xji.SYS Tue Apr 07 12:06:14 2009 (49DB79F6)
    9160b000 91665000   afd      afd.sys      Sat Nov 20 03:40:00 2010 (4CE78960)
    8ba00000 8ba12000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8bb0a000 8bb13000   amdxata  amdxata.sys  Fri Mar 19 12:19:01 2010 (4BA3A3F5)
    8bade000 8bae7000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8bae7000 8bb0a000   ataport  ataport.SYS  Sat Nov 20 03:38:00 2010 (4CE788E8)
    9b170000 9b1bd000   ATMFD    ATMFD.DLL    Sat Nov 20 04:06:57 2010 (4CE78FB1)
    8bff6000 8bffd000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    917e6000 917f4000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    83ab8000 83ac0000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    8237a000 82393000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    9b150000 9b16e000   cdd      cdd.dll      Sat Nov 20 06:56:35 2010 (4CE7B773)
    9a687000 9a6a6000   cdrom    cdrom.sys    Sat Nov 20 03:38:09 2010 (4CE788F1)
    83b02000 83bad000   CI       CI.dll       Sat Nov 20 07:05:17 2010 (4CE7B97D)
    8bf79000 8bf9e000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    83ac0000 83b02000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8bd75000 8bdd2000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    92be6000 92bf3000   CompositeBus CompositeBus.sys Sat Nov 20 04:50:21 2010 (4CE799DD)
    9a6b6000 9a6c3000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    9176a000 917ce000   csc      csc.sys      Sat Nov 20 03:44:32 2010 (4CE78A70)
    917ce000 917e6000   dfsc     dfsc.sys     Sat Nov 20 03:42:32 2010 (4CE789F8)
    9175e000 9176a000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8bf68000 8bf79000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    935ad000 935c6000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    9a6ce000 9a6d7000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9a6c3000 9a6ce000   dump_ataport dump_ataport.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    9a6d7000 9a6e8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    9a6ac000 9a6b6000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    92a3e000 92af5000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:08:14 2010 (4CE78FFE)
    92af5000 92b2e000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:07:03 2010 (4CE78FB7)
    82212000 822b8000   eamonm   eamonm.sys   Fri Aug 13 08:38:48 2010 (4C653CD8)
    8bfd0000 8bfef000   ehdrv    ehdrv.sys    Wed Jul 14 04:14:15 2010 (4C3D71D7)
    9a79e000 9a7b7000   epfwwfpr epfwwfpr.sys Wed Jul 14 04:09:41 2010 (4C3D70C5)
    8bb47000 8bb58000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8bb13000 8bb47000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8bde0000 8bde9000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8bf36000 8bf68000   fvevol   fvevol.sys   Sat Nov 20 03:40:22 2010 (4CE78976)
    8c17c000 8c1ad000   fwpkclnt fwpkclnt.sys Sat Nov 20 03:39:08 2010 (4CE7892C)
    9a6a6000 9a6ab280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
    8381f000 83856000   hal      halmacpi.dll Sat Nov 20 03:37:38 2010 (4CE788D2)
    92b2e000 92b4d000   HDAudBus HDAudBus.sys Sat Nov 20 04:59:28 2010 (4CE79C00)
    9a637000 9a687000   HdAudio  HdAudio.sys  Sat Nov 20 05:00:19 2010 (4CE79C33)
    9a6fe000 9a711000   HIDCLASS HIDCLASS.SYS Sat Nov 20 04:59:37 2010 (4CE79C09)
    9a711000 9a717480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    9a6f3000 9a6fe000   hidusb   hidusb.sys   Sat Nov 20 04:59:38 2010 (4CE79C0A)
    822f5000 8237a000   HTTP     HTTP.sys     Sat Nov 20 03:40:17 2010 (4CE78971)
    8bf2e000 8bf36000   hwpolicy hwpolicy.sys Sat Nov 20 03:37:35 2010 (4CE788CF)
    8ba77000 8ba7e000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8bbeb000 8bbfd000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    934aa000 934b7000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9a73c000 9a748000   kbdhid   kbdhid.sys   Sat Nov 20 04:50:10 2010 (4CE799D2)
    80bd0000 80bd8000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    934c6000 934fa000   ks       ks.sys       Sat Nov 20 04:50:17 2010 (4CE799D9)
    8bd62000 8bd75000   ksecdd   ksecdd.sys   Sat Nov 20 03:38:54 2010 (4CE7891E)
    8bef9000 8bf1e000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
    92b4d000 92b5f000   L1C62x86 L1C62x86.sys Thu Jun 24 08:41:16 2010 (4C23526C)
    822d2000 822e2000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    9a748000 9a763000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    83a22000 83aa7000   mcupdate mcupdate.dll Sat Nov 20 07:00:54 2010 (4CE7B876)
    9a6e8000 9a6f3000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    934b7000 934c4000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9a71a000 9a725000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8ba8c000 8baa2000   mountmgr mountmgr.sys Sat Nov 20 03:38:09 2010 (4CE788F1)
    82393000 823a5000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    823a5000 823c8000   mrxsmb   mrxsmb.sys   Sat Nov 20 03:42:40 2010 (4CE78A00)
    9a763000 9a79e000   mrxsmb10 mrxsmb10.sys Sat Nov 20 03:44:15 2010 (4CE78A5F)
    823c8000 823e3000   mrxsmb20 mrxsmb20.sys Sat Nov 20 03:42:47 2010 (4CE78A07)
    8bb8e000 8bb99000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8b9c2000 8b9ca000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8bd37000 8bd62000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    91754000 9175e000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8bf1e000 8bf2e000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8be04000 8bebb000   ndis     ndis.sys     Sat Nov 20 03:39:19 2010 (4CE78937)
    92bf3000 92bfe000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    93438000 9345a000   ndiswan  ndiswan.sys  Sat Nov 20 05:07:48 2010 (4CE79DF4)
    9354c000 9355d000   NDProxy  NDProxy.SYS  Sat Nov 20 05:07:39 2010 (4CE79DEB)
    916bd000 916cb000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    91665000 91697000   netbt    netbt.sys    Sat Nov 20 03:39:22 2010 (4CE7893A)
    8bebb000 8bef9000   NETIO    NETIO.SYS    Sat Nov 20 03:40:03 2010 (4CE78963)
    8bb99000 8bba7000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    9174a000 91754000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    8340d000 8381f000   nt       ntkrpamp.exe Sat Nov 20 03:42:49 2010 (4CE78A09)
    8bc08000 8bd37000   Ntfs     Ntfs.sys     Sat Nov 20 03:39:08 2010 (4CE7892C)
    8bfef000 8bff6000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    929fd000 929fe040   nvBridge nvBridge.kmd Fri Jan 07 20:57:19 2011 (4D27C47F)
    9355d000 9357e000   nvhda32v nvhda32v.sys Thu Nov 11 18:10:19 2010 (4CDC77DB)
    92003000 929fcee0   nvlddmkm nvlddmkm.sys Fri Jan 07 21:03:58 2011 (4D27C60E)
    9169e000 916bd000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    92bce000 92be6000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
    8b800000 8b811000   partmgr  partmgr.sys  Sat Nov 20 03:38:14 2010 (4CE788F6)
    823e3000 823ea000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
    8b9d5000 8b9ff000   pci      pci.sys      Sat Nov 20 03:37:57 2010 (4CE788E5)
    8ba7e000 8ba8c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8bdd2000 8bde0000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9fa1f000 9fab6000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    9357e000 935ad000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    83aa7000 83ab8000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8ba12000 8ba2a000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    9345a000 93472000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    93472000 93489000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    93489000 934a0000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    91709000 9174a000   rdbss    rdbss.sys    Sat Nov 20 03:42:44 2010 (4CE78A04)
    934a0000 934aa000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    8bdf5000 8bdfd000   RDPCDD   RDPCDD.sys   Sat Nov 20 05:22:19 2010 (4CE7A15B)
    8bc00000 8bc08000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    8bb86000 8bb8e000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8c000000 8c02d000   rdyboost rdyboost.sys Sat Nov 20 04:00:07 2010 (4CE78E17)
    822e2000 822f5000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    9fbf8000 9fbf9200   RTCore32 RTCore32.sys Wed May 25 02:39:05 2005 (42941D89)
    8b99c000 8b9c2000   SCSIPORT SCSIPORT.SYS Sat Nov 20 04:50:55 2010 (4CE799FF)
    9fab6000 9fac0000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    92bc4000 92bce000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    916cb000 916e5000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    8b892000 8b993000   spby     spby.sys     Mon Mar 23 02:38:33 2009 (49C72E69)
    8c1f5000 8c1fd000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    9fb3d000 9fb8e000   srv      srv.sys      Sat Nov 20 03:45:29 2010 (4CE78AA9)
    9faee000 9fb3d000   srv2     srv2.sys     Sat Nov 20 03:44:35 2010 (4CE78A73)
    9fac0000 9fae1000   srvnet   srvnet.sys   Sat Nov 20 03:44:27 2010 (4CE78A6B)
    934c4000 934c5380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8c032000 8c17c000   tcpip    tcpip.sys    Sat Nov 20 03:41:36 2010 (4CE789C0)
    9fae1000 9faee000   tcpipreg tcpipreg.sys Sat Nov 20 05:07:13 2010 (4CE79DD1)
    8bbbe000 8bbca000   TDI      TDI.SYS      Sat Nov 20 03:39:18 2010 (4CE78936)
    8bba7000 8bbbe000   tdx      tdx.sys      Sat Nov 20 03:39:17 2010 (4CE78935)
    916f8000 91709000   termdd   termdd.sys   Sat Nov 20 05:21:10 2010 (4CE7A116)
    9b120000 9b129000   TSDDD    TSDDD.dll    Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    8bbca000 8bbeb000   tunnel   tunnel.sys   Sat Nov 20 05:06:40 2010 (4CE79DB0)
    9a7b7000 9a7f7000   udfs     udfs.sys     Sat Nov 20 03:42:27 2010 (4CE789F3)
    934fa000 93508000   umbus    umbus.sys    Sat Nov 20 05:00:23 2010 (4CE79C37)
    9a725000 9a73c000   usbccgp  usbccgp.sys  Sat Nov 20 05:00:08 2010 (4CE79C28)
    9a718000 9a719700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    92bb5000 92bc4000   usbehci  usbehci.sys  Sat Nov 20 04:59:43 2010 (4CE79C0F)
    93508000 9354c000   usbhub   usbhub.sys   Sat Nov 20 05:00:34 2010 (4CE79C42)
    92b6a000 92bb5000   USBPORT  USBPORT.SYS  Sat Nov 20 04:59:49 2010 (4CE79C15)
    92b5f000 92b6a000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8b9ca000 8b9d5000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    8bde9000 8bdf5000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    8bb58000 8bb79000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8baa2000 8bacb180   vmbus    vmbus.sys    Sat Nov 20 04:14:58 2010 (4CE79192)
    8c1ad000 8c1b5380   vmstorfl vmstorfl.sys Sat Nov 20 04:14:37 2010 (4CE7917D)
    83a00000 83a10000   volmgr   volmgr.sys   Sat Nov 20 03:38:06 2010 (4CE788EE)
    8ba2c000 8ba77000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8c1b6000 8c1f5000   volsnap  volsnap.sys  Sat Nov 20 03:38:13 2010 (4CE788F5)
    916e5000 916f8000   wanarp   wanarp.sys   Sat Nov 20 05:07:45 2010 (4CE79DF1)
    8bb79000 8bb86000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8b813000 8b884000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8b884000 8b892000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    91697000 9169e000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    9aec0000 9b10c000   win32k   win32k.sys   Sat Nov 20 04:08:31 2010 (4CE7900F)
    8bacc000 8bade000   winhv    winhv.sys    Sat Nov 20 03:38:15 2010 (4CE788F7)
    8b993000 8b99c000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    822b8000 822d2000   WudfPf   WudfPf.sys   Sat Nov 20 04:58:55 2010 (4CE79BDF)
    
    Unloaded modules:
    9fb8e000 9fbf8000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    8bf9e000 8bfab000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    8bfab000 8bfb6000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    8bfb6000 8bfbf000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    8bfbf000 8bfd0000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    8bfd0000 8bfef000   cdrom.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001F000
    
    
     
  4. toink

    toink New Member

    Joined:
    Feb 3, 2011
    Messages:
    12
    Likes Received:
    0
    i googled rtcore, and it seems its related to msi afterburner, hmm.. lemme search more :)

    lemme restore defaults on bios.. brb

    attached is the screenshot of SPD and Memory tab of CPU-Z
     

    Attached Files:

  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    That driver mostly comes with MSI afterburner.

    The sticks are not from the same batch but are of the same brand and with the same rates. RAM is set right.

    Check if this RAM is compatible with your new mobo. Sometimes you need to set the voltage manually.


    ~~~~~~


    Memtest86+ - Advanced Memory Diagnostic Tool for 10 passes overnight.
     
  6. toink

    toink New Member

    Joined:
    Feb 3, 2011
    Messages:
    12
    Likes Received:
    0
    i just reloaded default config in the bios, will try memtest later this evening

    btw, thanx for a super fast reply :)
     

Share This Page

Loading...