Lots of BSOD/Application Errors

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Jlog, Feb 4, 2011.

  1. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Soo for ages i've been putting up with A LOT of BSOD and even more application errors my friend said you guys helped him out with his computer when it had similar problems (can't be sure of username).

    What I was told before I came here was to change my DRAM frequency as it was incorrect so I changed it to 800Mhz as instructed which made no difference but did make me get some BSOD pointing to system and graphics drivers (which I updated).

    Any help would be awesome because I can't do anything...I usually get about 50% through something whether it be installing a program, or playing a game or anything really. And with school coming up real soon I will need it to finish school work and 50% really won't cut it.

    Thanks, Jlog

    CPU-Z SPD. CPU-Z MEMORY.
     

    Attached Files:

  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    4e, 1a, 50 - caused by memory_corruption.

    From what I see in your screenshots, the memory is set right. However, I see slot #1 only - and I'd like to see all slots including those that are empty, slot #2, 3 and 4. Attach them.





    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020511-24765-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e3fe50
    Debug session time: Fri Feb  4 17:20:50.761 2011 (UTC - 5:00)
    System Uptime: 0 days 0:07:39.074
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 19c64, 0, 19224}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 0000000000019c64, page frame number
    Arg3: 0000000000000000, current page state
    Arg4: 0000000000019224, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Installer.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002d0238c to fffff80002c72740
    
    STACK_TEXT:  
    fffff880`0650ff98 fffff800`02d0238c : 00000000`0000004e 00000000`00000099 00000000`00019c64 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0650ffa0 fffff800`02ce49f7 : 00000000`00000000 fffff680`00052068 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
    fffff880`0650ffe0 fffff800`02c46c23 : fffffa80`065ba930 fffff700`000127df 0000007f`fffffff8 fffff8a0`0306fdf0 : nt! ?? ::FNODOBFM::`string'+0x3223e
    fffff880`06510070 fffff800`02c4568a : fffffa80`065ba930 fffffa80`00000069 fffff880`000117ac fffff800`00000006 : nt!MiDeleteAddressesInWorkingSet+0x307
    fffff880`06510920 fffff800`02f57dcf : fffff8a0`030be060 fffff880`06510c20 00000000`00000000 fffffa80`068f2b60 : nt!MmCleanProcessAddressSpace+0x96
    fffff880`06510970 fffff800`02f30635 : 00000000`c0000005 00000000`c0000001 00000000`7efa4000 fffffa80`0692c600 : nt!PspExitThread+0x92f
    fffff880`06510a30 fffff800`02c4f1db : 00000000`00000100 fffffa80`068f2c20 00000000`00000001 fffff800`02c79b9d : nt!PsExitSpecialApc+0x1d
    fffff880`06510a60 fffff800`02c4f620 : 00000000`00000000 fffff880`06510ae0 fffff800`02f3074c 00000000`00000001 : nt!KiDeliverApc+0x2eb
    fffff880`06510ae0 fffff800`02c71a37 : fffffa80`068f2b60 00000000`00000260 00000000`00000000 fffffa80`05b94600 : nt!KiInitiateUserApc+0x70
    fffff880`06510c20 00000000`75312dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
    00000000`031df0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75312dd9
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`02d0238c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20281-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
    Debug session time: Fri Feb  4 04:21:56.522 2011 (UTC - 5:00)
    System Uptime: 0 days 0:12:29.131
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff900c207e000, 0, fffff96000134a7f, 0}
    
    
    Could not read faulting driver name
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff900c207e000, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff96000134a7f, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef30e0
     fffff900c207e000 
    
    FAULTING_IP: 
    win32k!RestoreGammaRamp+53
    fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  winlogon.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88009518970 -- (.trap 0xfffff88009518970)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000591
    rdx=fffffa8006207b60 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff96000134a7f rsp=fffff88009518b00 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=00000000000015f3
    r11=fffffa8006207b60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po nc
    win32k!RestoreGammaRamp+0x53:
    fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx] ds:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002d3bf14 to fffff80002cbb740
    
    STACK_TEXT:  
    fffff880`09518808 fffff800`02d3bf14 : 00000000`00000050 fffff900`c207e000 00000000`00000000 fffff880`09518970 : nt!KeBugCheckEx
    fffff880`09518810 fffff800`02cb982e : 00000000`00000000 fffff900`c207e000 00000000`00000000 fffff960`00104da0 : nt! ?? ::FNODOBFM::`string'+0x42837
    fffff880`09518970 fffff960`00134a7f : fffff900`c207d9f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`09518b00 fffff960`00134e2e : fffff900`c207d3f0 ffffffff`d4010811 ffffffff`d4010811 ffffffff`d4010811 : win32k!RestoreGammaRamp+0x53
    fffff880`09518b30 fffff960`0007ae13 : fffffa80`05eb4090 fffff880`09518ca0 00000000`00000000 fffffa80`05eb4090 : win32k!xxxSwitchDesktopWithFade+0x1c6
    fffff880`09518bd0 fffff800`02cba993 : fffffa80`06207b60 00000000`ffbe8648 fffffa80`05eb4090 00000000`000001e0 : win32k!NtUserSwitchDesktop+0x103
    fffff880`09518c20 00000000`77a2524a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`012ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a2524a
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
        fffff96000134a7a - win32k!RestoreGammaRamp+4e
    	[ c7:c3 ]
    1 error : !win32k (fffff96000134a7a)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT
    
    Followup: memory_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20171-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
    Debug session time: Fri Feb  4 04:57:54.827 2011 (UTC - 5:00)
    System Uptime: 0 days 0:35:05.467
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1A, {3451, fffff6fc4001dc90, fffffa800630c8e0, 0}
    
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4e38d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
    Arg2: fffff6fc4001dc90
    Arg3: fffffa800630c8e0
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_3451
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740
    
    STACK_TEXT:  
    fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
    fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
    fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
    fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
    fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
    fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
    fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4e38d
    fffff800`02cfd84f cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d
    
    BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
    Arg2: fffff6fc4001dc90
    Arg3: fffffa800630c8e0
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_3451
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740
    
    STACK_TEXT:  
    fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
    fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
    fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
    fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
    fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
    fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
    fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+4e38d
    fffff800`02cfd84f cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d
    
    BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\020511-33484-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02014000 PsLoadedModuleList = 0xfffff800`02251e50
    Debug session time: Fri Feb  4 17:43:45.109 2011 (UTC - 5:00)
    System Uptime: 0 days 0:06:14.656
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    .............................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 6554d, 0, 6510d}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000006554d, page frame number
    Arg3: 0000000000000000, current page state
    Arg4: 000000000006510d, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Installer.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000211438c to fffff80002084740
    
    STACK_TEXT:  
    fffff880`04914778 fffff800`0211438c : 00000000`0000004e 00000000`00000099 00000000`0006554d 00000000`00000000 : nt!KeBugCheckEx
    fffff880`04914780 fffff800`020f66a9 : 00000000`00000000 fffff680`00060b38 00000000`00000000 00000000`000006f8 : nt!MiBadShareCount+0x4c
    fffff880`049147c0 fffff800`020b5381 : 00000000`00000000 fffff680`00060ff8 fffffa80`065b06a0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x31ed3
    fffff880`04914970 fffff800`020c60da : 00000000`00000000 00000000`0c28cfff fffffa80`00000000 fffffa80`065b06a0 : nt!MiDeleteVirtualAddresses+0x408
    fffff880`04914b30 fffff800`02083993 : ffffffff`ffffffff 00000000`0008e310 00000000`0008e308 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
    fffff880`04914c20 00000000`7744ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008e2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7744ff3a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0211438c cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`00f66000 fffff880`00fbd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02a71000 fffff880`02afb000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02e00000 fffff880`02e16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01177000 fffff880`01182000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`01144000 fffff880`0114d000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0114d000 fffff880`01177000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`017f9000 fffff880`01800000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02fcd000 fffff880`02fde000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`0328b000 fffff880`032a9000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff880`02f9a000 fffff880`02fc4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00d03000 fffff880`00dc3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00ca5000 fffff880`00d03000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014eb000 fffff880`0155e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`02fde000 fffff880`02fee000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`033b5000 fffff880`033c3000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02bdb000 fffff880`02bf9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`033cf000 fffff880`033d8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`033c3000 fffff880`033cf000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`033d8000 fffff880`033eb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03355000 fffff880`03361000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff960`00470000 fffff960`0048e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`02ee4000 fffff880`02f33000   e1k62x64 e1k62x64.sys Wed Sep 29 16:02:28 2010 (4CA39B54)
    fffff880`011ce000 fffff880`011e2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01182000 fffff880`011ce000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff960`00930000 fffff960`00939000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`0156f000 fffff880`01579000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`025f0000 fffff800`02639000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`02a26000 fffff880`02a4a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0324e000 fffff880`03267000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`03267000 fffff880`0326f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`03240000 fffff880`0324e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`017e2000 fffff880`017eb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`02a4a000 fffff880`02a59000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`03270000 fffff880`0327e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`00e6a000 fffff880`00ead000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`017b7000 fffff880`017e2000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`00c4d000 fffff880`00c91000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`02a59000 fffff880`02a68000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`0327e000 fffff880`0328b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`0112a000 fffff880`01144000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`032a9000 fffff880`032c1000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`00fd0000 fffff880`00ffd000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`044f1000 fffff880`0453f000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0453f000 fffff880`04562000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`01219000 fffff880`01224000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fc6000 fffff880`00fd0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02fee000 fffff880`02ff9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01665000 fffff880`01757000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`02e3a000 fffff880`02e46000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`02e46000 fffff880`02e75000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03340000 fffff880`03355000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02b6f000 fffff880`02b7e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02afb000 fffff880`02b40000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01757000 fffff880`017b7000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`01224000 fffff880`01235000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02bcf000 fffff880`02bdb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02014000 fffff800`025f0000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`014a8000 fffff880`014b1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`02b49000 fffff880`02b6f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01113000 fffff880`0111a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`0111a000 fffff880`0112a000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`0155e000 fffff880`0156f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00c91000 fffff880`00ca5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`02e16000 fffff880`02e3a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`02e75000 fffff880`02e90000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`02e90000 fffff880`02eb1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`02eb1000 fffff880`02ecb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02b7e000 fffff880`02bcf000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`01210000 fffff880`01219000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`015c5000 fffff880`015ff000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`02edf000 fffff880`02ee0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`0107c000 fffff880`01089000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0105e000 fffff880`0107c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02ecb000 fffff880`02edf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`00730000 fffff960`0073a000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`02a00000 fffff880`02a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03361000 fffff880`033b5000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`01089000 fffff880`0109b000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`03200000 fffff880`0321d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0321d000 fffff880`0321ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`02f33000 fffff880`02f44000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`032e6000 fffff880`03340000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`02f44000 fffff880`02f9a000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`014b1000 fffff880`014bf000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`014bf000 fffff880`014e4000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010b7000 fffff880`01113000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01579000 fffff880`015c5000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`01200000 fffff880`01210000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00eb3000 fffff880`00f57000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f57000 fffff880`00f66000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02b40000 fffff880`02b49000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00010000 fffff960`00320000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`02fc4000 fffff880`02fcd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00fbd000 fffff880`00fc6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`0321f000 fffff880`03240000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`017eb000 fffff880`017f9000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01480000 fffff880`0148c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0148c000 fffff880`01495000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01495000 fffff880`014a8000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`0164a000 fffff880`01652000   spldr.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    
     
  3. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
  4. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Finally... done... You have no idea how hard this was to get up

    One question how do I set the number of passes I want memtest to run?

    CPU-Z MEMORY4. CPU-Z MEMORY2. CPU-Z MEMORY3.
    [​IMG]
     
    #4 Jlog, Feb 4, 2011
    Last edited: Feb 5, 2011
  5. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    RAM is right - 800Mhz 6-6-6-18. Should be 1.5v.


    Just leave the memtest overnight for 8-10 hours and let it do the passes.
     
    #5 cybercore, Feb 5, 2011
    Last edited: Feb 5, 2011
  6. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Alright, I will do that and post the results
     
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    The OCZ sticks are identical and set right, which is very good. Check the manufacturer's site for any notes like needing to adjust the voltage manually.
     
  8. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Ok I will do that, as for memtest I've run it for just over 13 hours and it's done 5 nearly 6 passes and reported 98048 errors in ALOT of modules. Also how would you like me to display the final results
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You could take a picture of that, but if you confirm it showed errors - that's enough.


    1. Testing per stick and per slot can help you locate the faulty ones.
    2. Upgrade bios
    3. Load setup defaults again

    If nothing works, get new RAM, or motherboard - whatever proves faulty.
     
  10. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Joy oh sweet joy, ok I'll get on that oh and in regards to the ram voltage the website mentioned nothing in relation to voltage adjustment

    Edit* I checked both sticks in both slots and both came back with errors soo it looks like its new ram for me :/

    OMG -.-" It doesn't even support the ram I have installed *facepalm* Sorry to waste your time ><!
     
    #10 Jlog, Feb 5, 2011
    Last edited: Feb 5, 2011
  11. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Sure, I am not a Nazi to have you run 10 passes again just to be able to take a screenshot for me - I trust you. :)
     
  12. Jlog

    Jlog New Member

    Joined:
    Feb 4, 2011
    Messages:
    12
    Likes Received:
    0
    Ohh haha, If you saw my last post, I just found out that 800mhz ram isn't supported by my motherboad (yay!).

    I would have checked the compatability sooner but I bought the system from a friend who assured me it was >.> (sigh)

    Guess i'll have to be more careful.... Anyway i'm off to give him a right royal spraying!!

    Thanks, Jlog
     
  13. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Thanks for updating. Yes, I read this:


    Yours is the only thread where I didn't explicitly insist to check for compatibility with the motherboard. People are already sick of me saying the same thing over and over. : )
     

Share This Page

Loading...