Windows 7 Lots of BSOD/Application Errors

Jlog

New Member
Soo for ages i've been putting up with A LOT of BSOD and even more application errors my friend said you guys helped him out with his computer when it had similar problems (can't be sure of username).

What I was told before I came here was to change my DRAM frequency as it was incorrect so I changed it to 800Mhz as instructed which made no difference but did make me get some BSOD pointing to system and graphics drivers (which I updated).

Any help would be awesome because I can't do anything...I usually get about 50% through something whether it be installing a program, or playing a game or anything really. And with school coming up real soon I will need it to finish school work and 50% really won't cut it.

Thanks, Jlog

CPU-Z SPD.jpgCPU-Z MEMORY.jpg
 

Attachments

  • Seven Forums.zip
    2.9 MB · Views: 561
4e, 1a, 50 - caused by memory_corruption.

From what I see in your screenshots, the memory is set right. However, I see slot #1 only - and I'd like to see all slots including those that are empty, slot #2, 3 and 4. Attach them.





Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020511-24765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e3fe50
Debug session time: Fri Feb  4 17:20:50.761 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:39.074
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 19c64, 0, 19224}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000019c64, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000019224, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d0238c to fffff80002c72740

STACK_TEXT:  
fffff880`0650ff98 fffff800`02d0238c : 00000000`0000004e 00000000`00000099 00000000`00019c64 00000000`00000000 : nt!KeBugCheckEx
fffff880`0650ffa0 fffff800`02ce49f7 : 00000000`00000000 fffff680`00052068 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0650ffe0 fffff800`02c46c23 : fffffa80`065ba930 fffff700`000127df 0000007f`fffffff8 fffff8a0`0306fdf0 : nt! ?? ::FNODOBFM::`string'+0x3223e
fffff880`06510070 fffff800`02c4568a : fffffa80`065ba930 fffffa80`00000069 fffff880`000117ac fffff800`00000006 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`06510920 fffff800`02f57dcf : fffff8a0`030be060 fffff880`06510c20 00000000`00000000 fffffa80`068f2b60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`06510970 fffff800`02f30635 : 00000000`c0000005 00000000`c0000001 00000000`7efa4000 fffffa80`0692c600 : nt!PspExitThread+0x92f
fffff880`06510a30 fffff800`02c4f1db : 00000000`00000100 fffffa80`068f2c20 00000000`00000001 fffff800`02c79b9d : nt!PsExitSpecialApc+0x1d
fffff880`06510a60 fffff800`02c4f620 : 00000000`00000000 fffff880`06510ae0 fffff800`02f3074c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`06510ae0 fffff800`02c71a37 : fffffa80`068f2b60 00000000`00000260 00000000`00000000 fffffa80`05b94600 : nt!KiInitiateUserApc+0x70
fffff880`06510c20 00000000`75312dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`031df0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75312dd9


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`02d0238c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
Debug session time: Fri Feb  4 04:21:56.522 2011 (UTC - 5:00)
System Uptime: 0 days 0:12:29.131
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff900c207e000, 0, fffff96000134a7f, 0}


Could not read faulting driver name
Probably caused by : memory_corruption

Followup: memory_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c207e000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff96000134a7f, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef30e0
 fffff900c207e000 

FAULTING_IP: 
win32k!RestoreGammaRamp+53
fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

PROCESS_NAME:  winlogon.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009518970 -- (.trap 0xfffff88009518970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000591
rdx=fffffa8006207b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000134a7f rsp=fffff88009518b00 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=00000000000015f3
r11=fffffa8006207b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
win32k!RestoreGammaRamp+0x53:
fffff960`00134a7f 3b33            cmp     esi,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d3bf14 to fffff80002cbb740

STACK_TEXT:  
fffff880`09518808 fffff800`02d3bf14 : 00000000`00000050 fffff900`c207e000 00000000`00000000 fffff880`09518970 : nt!KeBugCheckEx
fffff880`09518810 fffff800`02cb982e : 00000000`00000000 fffff900`c207e000 00000000`00000000 fffff960`00104da0 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`09518970 fffff960`00134a7f : fffff900`c207d9f8 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`09518b00 fffff960`00134e2e : fffff900`c207d3f0 ffffffff`d4010811 ffffffff`d4010811 ffffffff`d4010811 : win32k!RestoreGammaRamp+0x53
fffff880`09518b30 fffff960`0007ae13 : fffffa80`05eb4090 fffff880`09518ca0 00000000`00000000 fffffa80`05eb4090 : win32k!xxxSwitchDesktopWithFade+0x1c6
fffff880`09518bd0 fffff800`02cba993 : fffffa80`06207b60 00000000`ffbe8648 fffffa80`05eb4090 00000000`000001e0 : win32k!NtUserSwitchDesktop+0x103
fffff880`09518c20 00000000`77a2524a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a2524a


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
    fffff96000134a7a - win32k!RestoreGammaRamp+4e
	[ c7:c3 ]
1 error : !win32k (fffff96000134a7a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT

Followup: memory_corruption
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020411-20171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
Debug session time: Fri Feb  4 04:57:54.827 2011 (UTC - 5:00)
System Uptime: 0 days 0:35:05.467
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {3451, fffff6fc4001dc90, fffffa800630c8e0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4e38d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
Arg2: fffff6fc4001dc90
Arg3: fffffa800630c8e0
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_3451

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740

STACK_TEXT:  
fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4e38d
fffff800`02cfd84f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003451, The PTEs of an outswapped kernel thread stack are corrupt.
Arg2: fffff6fc4001dc90
Arg3: fffffa800630c8e0
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_3451

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002cfd84f to fffff80002c78740

STACK_TEXT:  
fffff880`0331db58 fffff800`02cfd84f : 00000000`0000001a 00000000`00003451 fffff6fc`4001dc90 fffffa80`0630c8e0 : nt!KeBugCheckEx
fffff880`0331db60 fffff800`02c6d1ec : fffffa80`0630c8e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4e38d
fffff880`0331dc70 fffff800`02c6d187 : 00000000`00000000 00000000`00000001 fffffa80`03bafb30 00000000`00000080 : nt!MmInPageKernelStack+0x40
fffff880`0331dcd0 fffff800`02c6ce2c : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03bafb00 : nt!KiInSwapKernelStacks+0x1f
fffff880`0331dd00 fffff800`02f1cc06 : 0048804a`a0928130 00650064`006f0043 0074006e`00490020 00690072`00670065 : nt!KeSwapProcessOrStack+0x84
fffff880`0331dd40 fffff800`02c56c26 : fffff880`009e7180 fffffa80`03c50680 fffff880`009f1fc0 696d2e77`77772f2f : nt!PspSystemThreadStartup+0x5a
fffff880`0331dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4e38d
fffff800`02cfd84f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+4e38d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

BUCKET_ID:  X64_0x1a_3451_nt!_??_::FNODOBFM::_string_+4e38d

Followup: MachineOwner
---------








Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\020511-33484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02014000 PsLoadedModuleList = 0xfffff800`02251e50
Debug session time: Fri Feb  4 17:43:45.109 2011 (UTC - 5:00)
System Uptime: 0 days 0:06:14.656
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
.............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 6554d, 0, 6510d}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000006554d, page frame number
Arg3: 0000000000000000, current page state
Arg4: 000000000006510d, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000211438c to fffff80002084740

STACK_TEXT:  
fffff880`04914778 fffff800`0211438c : 00000000`0000004e 00000000`00000099 00000000`0006554d 00000000`00000000 : nt!KeBugCheckEx
fffff880`04914780 fffff800`020f66a9 : 00000000`00000000 fffff680`00060b38 00000000`00000000 00000000`000006f8 : nt!MiBadShareCount+0x4c
fffff880`049147c0 fffff800`020b5381 : 00000000`00000000 fffff680`00060ff8 fffffa80`065b06a0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x31ed3
fffff880`04914970 fffff800`020c60da : 00000000`00000000 00000000`0c28cfff fffffa80`00000000 fffffa80`065b06a0 : nt!MiDeleteVirtualAddresses+0x408
fffff880`04914b30 fffff800`02083993 : ffffffff`ffffffff 00000000`0008e310 00000000`0008e308 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`04914c20 00000000`7744ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7744ff3a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0211438c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`00f66000 fffff880`00fbd000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02a71000 fffff880`02afb000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02e00000 fffff880`02e16000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01177000 fffff880`01182000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01144000 fffff880`0114d000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0114d000 fffff880`01177000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`017f9000 fffff880`01800000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02fcd000 fffff880`02fde000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0328b000 fffff880`032a9000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`02f9a000 fffff880`02fc4000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d03000 fffff880`00dc3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ca5000 fffff880`00d03000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014eb000 fffff880`0155e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`02fde000 fffff880`02fee000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`033b5000 fffff880`033c3000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02bdb000 fffff880`02bf9000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`033cf000 fffff880`033d8000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`033c3000 fffff880`033cf000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`033d8000 fffff880`033eb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03355000 fffff880`03361000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00470000 fffff960`0048e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02ee4000 fffff880`02f33000   e1k62x64 e1k62x64.sys Wed Sep 29 16:02:28 2010 (4CA39B54)
fffff880`011ce000 fffff880`011e2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01182000 fffff880`011ce000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00930000 fffff960`00939000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0156f000 fffff880`01579000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`025f0000 fffff800`02639000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`02a26000 fffff880`02a4a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0324e000 fffff880`03267000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`03267000 fffff880`0326f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`03240000 fffff880`0324e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`017e2000 fffff880`017eb000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`02a4a000 fffff880`02a59000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03270000 fffff880`0327e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9d000 fffff800`00ba7000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`00e6a000 fffff880`00ead000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013e3000 fffff880`013fd000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`017b7000 fffff880`017e2000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c4d000 fffff880`00c91000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02a59000 fffff880`02a68000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0327e000 fffff880`0328b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`0112a000 fffff880`01144000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`032a9000 fffff880`032c1000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`00fd0000 fffff880`00ffd000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`044f1000 fffff880`0453f000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0453f000 fffff880`04562000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01219000 fffff880`01224000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00fd0000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02fee000 fffff880`02ff9000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01665000 fffff880`01757000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02e3a000 fffff880`02e46000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02e46000 fffff880`02e75000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03340000 fffff880`03355000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02b6f000 fffff880`02b7e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02afb000 fffff880`02b40000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01757000 fffff880`017b7000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`01224000 fffff880`01235000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02bcf000 fffff880`02bdb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02014000 fffff800`025f0000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01240000 fffff880`013e3000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`014a8000 fffff880`014b1000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02b49000 fffff880`02b6f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e40000 fffff880`00e55000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01113000 fffff880`0111a000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`0111a000 fffff880`0112a000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0155e000 fffff880`0156f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c91000 fffff880`00ca5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02e16000 fffff880`02e3a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`02e75000 fffff880`02e90000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`02e90000 fffff880`02eb1000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02eb1000 fffff880`02ecb000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02b7e000 fffff880`02bcf000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01210000 fffff880`01219000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015c5000 fffff880`015ff000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02edf000 fffff880`02ee0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01800000 fffff880`019fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0107c000 fffff880`01089000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0105e000 fffff880`0107c000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02ecb000 fffff880`02edf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00730000 fffff960`0073a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02a00000 fffff880`02a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03361000 fffff880`033b5000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`01089000 fffff880`0109b000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`03200000 fffff880`0321d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0321d000 fffff880`0321ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`02f33000 fffff880`02f44000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`032e6000 fffff880`03340000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`02f44000 fffff880`02f9a000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e33000 fffff880`00e40000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014b1000 fffff880`014bf000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`014bf000 fffff880`014e4000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00e55000 fffff880`00e6a000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010b7000 fffff880`01113000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01579000 fffff880`015c5000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`01200000 fffff880`01210000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eb3000 fffff880`00f57000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f57000 fffff880`00f66000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02b40000 fffff880`02b49000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`00320000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`02fc4000 fffff880`02fcd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00fbd000 fffff880`00fc6000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0321f000 fffff880`03240000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`017eb000 fffff880`017f9000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01480000 fffff880`0148c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0148c000 fffff880`01495000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01495000 fffff880`014a8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`0164a000 fffff880`01652000   spldr.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
 
Finally... done... You have no idea how hard this was to get up

One question how do I set the number of passes I want memtest to run?

CPU-Z MEMORY4.jpgCPU-Z MEMORY2.jpgCPU-Z MEMORY3.jpg
pencil.png
 
Last edited:
RAM is right - 800Mhz 6-6-6-18. Should be 1.5v.


Just leave the memtest overnight for 8-10 hours and let it do the passes.
 
Last edited:
The OCZ sticks are identical and set right, which is very good. Check the manufacturer's site for any notes like needing to adjust the voltage manually.
 
Ok I will do that, as for memtest I've run it for just over 13 hours and it's done 5 nearly 6 passes and reported 98048 errors in ALOT of modules. Also how would you like me to display the final results
 
Ok I will do that, as for memtest I've run it for just over 13 hours and it's done 5 nearly 6 passes and reported 98048 errors in ALOT of modules. Also how would you like me to display the final results

You could take a picture of that, but if you confirm it showed errors - that's enough.


1. Testing per stick and per slot can help you locate the faulty ones.
2. Upgrade bios
3. Load setup defaults again

If nothing works, get new RAM, or motherboard - whatever proves faulty.
 
Joy oh sweet joy, ok I'll get on that oh and in regards to the ram voltage the website mentioned nothing in relation to voltage adjustment

Edit* I checked both sticks in both slots and both came back with errors soo it looks like its new ram for me :/

OMG -.-" It doesn't even support the ram I have installed *facepalm* Sorry to waste your time ><!
 
Last edited:
Ohh haha, If you saw my last post, I just found out that 800mhz ram isn't supported by my motherboad (yay!).

I would have checked the compatability sooner but I bought the system from a friend who assured me it was >.> (sigh)

Guess i'll have to be more careful.... Anyway i'm off to give him a right royal spraying!!

Thanks, Jlog
 
Thanks for updating. Yes, I read this:

OMG -.-" It doesn't even support the ram I have installed *facepalm* Sorry to waste your time ><!


Yours is the only thread where I didn't explicitly insist to check for compatibility with the motherboard. People are already sick of me saying the same thing over and over. : )
 
Back
Top