Lots of BSOD/Application Errors

Jlog

New Member
Soo for ages i've been putting up with A LOT of BSOD and even more application errors my friend said you guys helped him out with his computer when it had similar problems (can't be sure of username).

What I was told before I came here was to change my DRAM frequency as it was incorrect so I changed it to 800Mhz as instructed which made no difference but did make me get some BSOD pointing to system and graphics drivers (which I updated).

Any help would be awesome because I can't do anything...I usually get about 50% through something whether it be installing a program, or playing a game or anything really. And with school coming up real soon I will need it to finish school work and 50% really won't cut it.

Thanks, Jlog

CPU-Z SPD.jpgCPU-Z MEMORY.jpg
 


Attachments

cybercore

New Member
4e, 1a, 50 - caused by memory_corruption.

From what I see in your screenshots, the memory is set right. However, I see slot #1 only - and I'd like to see all slots including those that are empty, slot #2, 3 and 4. Attach them.





Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020511-24765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e3fe50
Debug session time: Fri Feb  4 17:20:50.761 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:39.074
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 19c64, 0, 19224}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000019c64, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000019224, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d0238c to fffff80002c72740

STACK_TEXT:  
fffff880`0650ff98 fffff800`02d0238c : 00000000`0000004e 00000000`00000099 00000000`00019c64 00000000`00000000 : nt!KeBugCheckEx
fffff880`0650ffa0 fffff800`02ce49f7 : 00000000`00000000 fffff680`00052068 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0650ffe0 fffff800`02c46c23 : fffffa80`065ba930 fffff700`000127df 0000007f`fffffff8 fffff8a0`0306fdf0 : nt! ?? ::FNODOBFM::`string'+0x3223e
fffff880`06510070 fffff800`02c4568a : fffffa80`065ba930 fffffa80`00000069 fffff880`000117ac fffff800`00000006 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`06510920 fffff800`02f57dcf : fffff8a0`030be060 fffff880`06510c20 00000000`00000000 fffffa80`068f2b60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`06510970 fffff800`02f30635 : 00000000`c0000005 00000000`c0000001 00000000`7efa4000 fffffa80`0692c600 : nt!PspExitThread+0x92f
fffff880`06510a30 fffff800`02c4f1db : 00000000`00000100 fffffa80`068f2c20 00000000`00000001 fffff800`02c79b9d : nt!PsExitSpecialApc+0x1d
fffff880`06510a60 fffff800`02c4f620 : 00000000`00000000 fffff880`06510ae0 fffff800`02f3074c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`06510ae0 fffff800`02c71a37 : fffffa80`068f2b60 00000000`00000260 00000000`00000000 fffffa80`05b94600 : nt!KiInitiateUserApc+0x70
fffff880`06510c20 00000000`75312dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`031df0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75312dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`02d0238c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
Debug session time: Fri Feb  4 04:21:56.522 2011 (UTC - 5:00)
System Uptime: 0 days 0:12:29.131
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff900c207e000, 0, fffff96000134a7f, 0}


Could not read faulting driver name
Probably caused by : memory_corruption

Followup: memory_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c207e000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff96000134a7f, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef30e0
 fffff900c207e000 

FAULTING_IP: 
win32k!RestoreGammaRamp+53
fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

PROCESS_NAME:  winlogon.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009518970 -- (.trap 0xfffff88009518970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000591
rdx=fffffa8006207b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000134a7f rsp=fffff88009518b00 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=00000000000015f3
r11=fffffa8006207b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
win32k!RestoreGammaRamp+0x53:
fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d3bf14 to fffff80002cbb740

STACK_TEXT:  
fffff880`09518808 fffff800`02d3bf14 : 00000000`00000050 fffff900`c207e000 00000000`00000000 fffff880`09518970 : nt!KeBugCheckEx
fffff880`09518810 fffff800`02cb982e : 00000000`00000000 fffff900`c207e000 00000000`00000000 fffff960`00104da0 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`09518970 fffff960`00134a7f : fffff900`c207d9f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`09518b00 fffff960`00134e2e : fffff900`c207d3f0 ffffffff`d4010811 ffffffff`d4010811 ffffffff`d4010811 : win32k!RestoreGammaRamp+0x53
fffff880`09518b30 fffff960`0007ae13 : fffffa80`05eb4090 fffff880`09518ca0 00000000`00000000 fffffa80`05eb4090 : win32k!xxxSwitchDesktopWithFade+0x1c6
fffff880`09518bd0 fffff800`02cba993 : fffffa80`06207b60 00000000`ffbe8648 fffffa80`05eb4090 00000000`000001e0 : win32k!NtUserSwitchDesktop+0x103
fffff880`09518c20 00000000`77a2524a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a2524a


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
    fffff96000134a7a - win32k!RestoreGammaRamp+4e
	[ c7:c3 ]
1 error : !win32k (fffff96000134a7a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT

Followup: memory_corruption
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
Debug session time: Fri Feb  4 04:57:54.827 2011 (UTC - 5:00)
System Uptime: 0 days 0:35:05.467
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {3451, fffff6fc4001dc90, fffffa800630c8e0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4e38d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
Arg2: fffff6fc4001dc90
Arg3: fffffa800630c8e0
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_3451

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740

STACK_TEXT:  
fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4e38d
fffff800`02cfd84f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
Arg2: fffff6fc4001dc90
Arg3: fffffa800630c8e0
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_3451

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740

STACK_TEXT:  
fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4e38d
fffff800`02cfd84f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

Followup: MachineOwner
---------








Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020511-33484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02014000 PsLoadedModuleList = 0xfffff800`02251e50
Debug session time: Fri Feb  4 17:43:45.109 2011 (UTC - 5:00)
System Uptime: 0 days 0:06:14.656
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
.............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 6554d, 0, 6510d}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000006554d, page frame number
Arg3: 0000000000000000, current page state
Arg4: 000000000006510d, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000211438c to fffff80002084740

STACK_TEXT:  
fffff880`04914778 fffff800`0211438c : 00000000`0000004e 00000000`00000099 00000000`0006554d 00000000`00000000 : nt!KeBugCheckEx
fffff880`04914780 fffff800`020f66a9 : 00000000`00000000 fffff680`00060b38 00000000`00000000 00000000`000006f8 : nt!MiBadShareCount+0x4c
fffff880`049147c0 fffff800`020b5381 : 00000000`00000000 fffff680`00060ff8 fffffa80`065b06a0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x31ed3
fffff880`04914970 fffff800`020c60da : 00000000`00000000 00000000`0c28cfff fffffa80`00000000 fffffa80`065b06a0 : nt!MiDeleteVirtualAddresses+0x408
fffff880`04914b30 fffff800`02083993 : ffffffff`ffffffff 00000000`0008e310 00000000`0008e308 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`04914c20 00000000`7744ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7744ff3a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0211438c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`00f66000 fffff880`00fbd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02a71000 fffff880`02afb000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02e00000 fffff880`02e16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01177000 fffff880`01182000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01144000 fffff880`0114d000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0114d000 fffff880`01177000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`017f9000 fffff880`01800000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02fcd000 fffff880`02fde000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0328b000 fffff880`032a9000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`02f9a000 fffff880`02fc4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d03000 fffff880`00dc3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca5000 fffff880`00d03000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014eb000 fffff880`0155e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`02fde000 fffff880`02fee000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`033b5000 fffff880`033c3000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02bdb000 fffff880`02bf9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`033cf000 fffff880`033d8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`033c3000 fffff880`033cf000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`033d8000 fffff880`033eb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03355000 fffff880`03361000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00470000 fffff960`0048e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02ee4000 fffff880`02f33000   e1k62x64 e1k62x64.sys Wed Sep 29 16:02:28 2010 (4CA39B54)
fffff880`011ce000 fffff880`011e2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01182000 fffff880`011ce000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00930000 fffff960`00939000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0156f000 fffff880`01579000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`025f0000 fffff800`02639000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`02a26000 fffff880`02a4a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0324e000 fffff880`03267000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`03267000 fffff880`0326f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`03240000 fffff880`0324e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`017e2000 fffff880`017eb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02a4a000 fffff880`02a59000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03270000 fffff880`0327e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`00e6a000 fffff880`00ead000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017b7000 fffff880`017e2000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c4d000 fffff880`00c91000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02a59000 fffff880`02a68000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0327e000 fffff880`0328b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`0112a000 fffff880`01144000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`032a9000 fffff880`032c1000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`00fd0000 fffff880`00ffd000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`044f1000 fffff880`0453f000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0453f000 fffff880`04562000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01219000 fffff880`01224000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00fd0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02fee000 fffff880`02ff9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01665000 fffff880`01757000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02e3a000 fffff880`02e46000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02e46000 fffff880`02e75000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03340000 fffff880`03355000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02b6f000 fffff880`02b7e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02afb000 fffff880`02b40000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01757000 fffff880`017b7000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`01224000 fffff880`01235000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02bcf000 fffff880`02bdb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02014000 fffff800`025f0000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`014a8000 fffff880`014b1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02b49000 fffff880`02b6f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01113000 fffff880`0111a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`0111a000 fffff880`0112a000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0155e000 fffff880`0156f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c91000 fffff880`00ca5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02e16000 fffff880`02e3a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02e75000 fffff880`02e90000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02e90000 fffff880`02eb1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02eb1000 fffff880`02ecb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02b7e000 fffff880`02bcf000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01210000 fffff880`01219000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015c5000 fffff880`015ff000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02edf000 fffff880`02ee0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0107c000 fffff880`01089000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0105e000 fffff880`0107c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02ecb000 fffff880`02edf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00730000 fffff960`0073a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02a00000 fffff880`02a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03361000 fffff880`033b5000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`01089000 fffff880`0109b000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03200000 fffff880`0321d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0321d000 fffff880`0321ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02f33000 fffff880`02f44000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`032e6000 fffff880`03340000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`02f44000 fffff880`02f9a000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014b1000 fffff880`014bf000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`014bf000 fffff880`014e4000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010b7000 fffff880`01113000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01579000 fffff880`015c5000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01210000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eb3000 fffff880`00f57000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f57000 fffff880`00f66000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b40000 fffff880`02b49000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00320000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`02fc4000 fffff880`02fcd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fbd000 fffff880`00fc6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0321f000 fffff880`03240000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`017eb000 fffff880`017f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01480000 fffff880`0148c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0148c000 fffff880`01495000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01495000 fffff880`014a8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0164a000 fffff880`01652000   spldr.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
 


Jlog

New Member
Finally... done... You have no idea how hard this was to get up

One question how do I set the number of passes I want memtest to run?

CPU-Z MEMORY4.jpgCPU-Z MEMORY2.jpgCPU-Z MEMORY3.jpg
 


Last edited:

cybercore

New Member
RAM is right - 800Mhz 6-6-6-18. Should be 1.5v.


Just leave the memtest overnight for 8-10 hours and let it do the passes.
 


Last edited:

Jlog

New Member
Alright, I will do that and post the results
 


cybercore

New Member
The OCZ sticks are identical and set right, which is very good. Check the manufacturer's site for any notes like needing to adjust the voltage manually.
 


Jlog

New Member
Ok I will do that, as for memtest I've run it for just over 13 hours and it's done 5 nearly 6 passes and reported 98048 errors in ALOT of modules. Also how would you like me to display the final results
 


cybercore

New Member
Ok I will do that, as for memtest I've run it for just over 13 hours and it's done 5 nearly 6 passes and reported 98048 errors in ALOT of modules. Also how would you like me to display the final results
You could take a picture of that, but if you confirm it showed errors - that's enough.


1. Testing per stick and per slot can help you locate the faulty ones.
2. Upgrade bios
3. Load setup defaults again

If nothing works, get new RAM, or motherboard - whatever proves faulty.
 


Jlog

New Member
Joy oh sweet joy, ok I'll get on that oh and in regards to the ram voltage the website mentioned nothing in relation to voltage adjustment

Edit* I checked both sticks in both slots and both came back with errors soo it looks like its new ram for me :/

OMG -.-" It doesn't even support the ram I have installed *facepalm* Sorry to waste your time ><!
 


Last edited:

cybercore

New Member
Joy oh sweet joy
Sure, I am not a Nazi to have you run 10 passes again just to be able to take a screenshot for me - I trust you. :)
 


Jlog

New Member
Ohh haha, If you saw my last post, I just found out that 800mhz ram isn't supported by my motherboad (yay!).

I would have checked the compatability sooner but I bought the system from a friend who assured me it was >.> (sigh)

Guess i'll have to be more careful.... Anyway i'm off to give him a right royal spraying!!

Thanks, Jlog
 


cybercore

New Member
Thanks for updating. Yes, I read this:

OMG -.-" It doesn't even support the ram I have installed *facepalm* Sorry to waste your time ><!

Yours is the only thread where I didn't explicitly insist to check for compatibility with the motherboard. People are already sick of me saying the same thing over and over. : )
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.
Top