Windows 7 New Computer Build Multiple BSODs

bboyoxygen

New Member
I just built a new computer for my inlaws and had several BSODs with different bccodes (1, 1a, a). I formatted and reinstalled the OS, updates, as well as clean installs of all recent drivers downloaded from the manufacturer websites. I have had several BSODs after this and I am worried that it may be related to the memory I have installed.

I ran a full disk scan, as well as SeaTools short and long tests. These were all passed with no errors. Also, I have updated the bios to the most recent, reseated ram, unplugged/replugged all sata and power cables inside. Specs are as follows:

Windows 7 Home Premium x64
CPU: AMD Phenom II 555 3.2Ghz Quad Core
Motherboard: Asus M4A785-M onboard sound, video, wired lan
Memory: G.Skill 4GB DDR2-800 (2x2gb) F2-6400CL5D-4GBNT
HDD: Seagate Barracuda 320gb SATA2

Thank you in advance for any help provided!
 

Attachments

  • minidump.zip
    66.2 KB · Views: 199
  • Minidump5.26.11.zip
    20.8 KB · Views: 198
Last edited:
mini dumps

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88002fbd348, fffff88002fbcba0, fffff880010553e1}
Probably caused by : Ntfs.sys ( Ntfs+e3e1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88002fbd348
Arg3: fffff88002fbcba0
Arg4: fffff880010553e1
Debugging Details:
------------------

EXCEPTION_RECORD:  fffff88002fbd348 -- (.exr 0xfffff88002fbd348)
ExceptionAddress: fffff880010553e1 (Ntfs+0x000000000000e3e1)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT:  fffff88002fbcba0 -- (.cxr 0xfffff88002fbcba0)
rax=fffff8a00958bfc0 rbx=0000000000000000 rcx=fffffa80045d2550
rdx=006d05adfc0edb8c rsi=7fffffffffffffff rdi=000000001106192b
rip=fffff880010553e1 rsp=fffff88002fbd588 rbp=fffff80002e26260
 r8=0000000000000072  r9=0000000000000000 r10=fffff80002e10348
r11=fffffa80045d24e0 r12=fffffa8003b66e50 r13=fffffa8004563180
r14=0000000000000001 r15=fffffa80045d24dc
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
Ntfs+0xe3e1:
fffff880`010553e1 668b040a        mov     ax,word ptr [rdx+rcx] ds:002b:006d002e`006c00dc=????
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  System
CURRENT_IRQL:  0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1:  0000000000000000
EXCEPTION_PARAMETER2:  ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb8100
 ffffffffffffffff 
FOLLOWUP_IP: 
Ntfs+e3e1
fffff880`010553e1 668b040a        mov     ax,word ptr [rdx+rcx]
FAULTING_IP: 
Ntfs+e3e1
fffff880`010553e1 668b040a        mov     ax,word ptr [rdx+rcx]
BUGCHECK_STR:  0x24
LAST_CONTROL_TRANSFER:  from fffff8800110c20d to fffff880010553e1
STACK_TEXT:  
fffff880`02fbd588 fffff880`0110c20d : fffff8a0`00000000 00000000`00000000 fffff880`02fbdab0 00000000`000007ff : Ntfs+0xe3e1
fffff880`02fbd590 fffff880`0110f8db : fffff880`02fbdab0 fffffa80`04563180 fffff880`02fbda00 fffff880`01062000 : Ntfs+0xc520d
fffff880`02fbd990 fffff880`0110e27b : fffff880`02fbdab0 fffffa80`04563180 fffffa80`04563188 fffff880`01055020 : Ntfs+0xc88db
fffff880`02fbd9e0 fffff880`01110398 : fffff880`02fbdab0 00000000`00000000 fffff880`0110f890 fffff880`02fbdcb8 : Ntfs+0xc727b
fffff880`02fbda80 fffff800`02c93021 : fffff800`02e26200 fffff800`02f7f000 fffff800`02e26200 00000000`00000005 : Ntfs+0xc9398
fffff880`02fbdcb0 fffff800`02f2532e : 00000000`00000000 fffffa80`037b5040 00000000`00000080 fffffa80`0366b9e0 : nt!ExpWorkerThread+0x111
fffff880`02fbdd40 fffff800`02c7a666 : fffff880`009e9180 fffffa80`037b5040 fffff880`009f3f40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fbdd80 00000000`00000000 : fffff880`02fbe000 fffff880`02fb8000 fffff880`02fbd9e0 00000000`00000000 : nt!KiStartSystemThread+0x16

SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  Ntfs+e3e1
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME:  Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9
STACK_COMMAND:  .cxr 0xfffff88002fbcba0 ; kb
FAILURE_BUCKET_ID:  X64_0x24_Ntfs+e3e1
BUCKET_ID:  X64_0x24_Ntfs+e3e1
Followup: MachineOwner
---------
Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa800365d180, the pool entry being checked.
Arg3: fffffa800365d580, the read back flink freelist value (should be the same as 2).
Arg4: fffffa800365d580, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------

BUGCHECK_STR:  0x19_3
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  avgchsva.exe
CURRENT_IRQL:  0
LAST_CONTROL_TRANSFER:  from fffff80002dbe4b3 to fffff80002c93d00
STACK_TEXT:  
fffff880`06dd6718 fffff800`02dbe4b3 : 00000000`00000019 00000000`00000003 fffffa80`0365d180 fffffa80`0365d580 : nt!KeBugCheckEx
fffff880`06dd6720 fffff800`02cab174 : 00000000`00000000 fffffa80`03c6dc80 00000000`000f001f 00000000`00000000 : nt!ExDeferredFreePool+0xa53
fffff880`06dd6810 fffff800`02c77f5c : fffff880`06dd6b88 00000000`00000001 00000000`00000000 fffff880`06dd6910 : nt!MiAddViewsForSection+0x1d4
fffff880`06dd68a0 fffff800`02fac4ed : 00000000`00000001 00000000`00000007 00000000`00000000 fffff880`06dd6b58 : nt!MiAddViewsForSectionWithPfn+0x98
fffff880`06dd6910 fffff800`02fac9bb : fffffa80`03c6dc00 fffffa80`04f43480 fffff880`06dd6b50 fffffa80`05e02060 : nt!MiMapViewOfDataSection+0x64d
fffff880`06dd69f0 fffff800`02face1e : fffffa80`00000001 fffffa80`04f43480 fffff880`06dd6b50 00000000`00000000 : nt!MiMapViewOfSection+0x20b
fffff880`06dd6ae0 fffff800`02c92f93 : 00000000`00000458 fffffa80`05e02060 00000000`02bfe518 00000000`00001001 : nt!NtMapViewOfSection+0x2bd
fffff880`06dd6bb0 00000000`77a1159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02bfe4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a1159a

STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!ExDeferredFreePool+a53
fffff800`02dbe4b3 cc              int     3
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!ExDeferredFreePool+a53
FOLLOWUP_NAME:  Pool_corruption
IMAGE_NAME:  Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP:  0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a53
BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a53
Followup: Pool_corruption
---------

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80002ccf337}
Probably caused by : win32k.sys ( win32k!NtUserGetMessage+a1 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ccf337, address which referenced memory
Debugging Details:
------------------

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0b100
 0000000000000000 
CURRENT_IRQL:  2
FAULTING_IP: 
nt!KiDeliverApc+187
fffff800`02ccf337 488910          mov     qword ptr [rax],rdx
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  conhost.exe
TRAP_FRAME:  fffff880063e1920 -- (.trap 0xfffff880063e1920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ccf337 rsp=fffff880063e1ab0 rbp=0000000000000000
 r8=fffffa8005bcffb0  r9=0000000000000000 r10=fffffa8005bcffa0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiDeliverApc+0x187:
fffff800`02ccf337 488910          mov     qword ptr [rax],rdx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff80002cdb2a9 to fffff80002cdbd00
STACK_TEXT:  
fffff880`063e17d8 fffff800`02cdb2a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`063e17e0 fffff800`02cd9f20 : 00000000`00000000 fffff960`002c5e2a 00000000`00000000 fffffa80`05bcfb60 : nt!KiBugCheckDispatch+0x69
fffff880`063e1920 fffff800`02ccf337 : 00000001`00000000 00000000`00000001 00000000`00000000 00000000`05bcfb60 : nt!KiPageFault+0x260
fffff880`063e1ab0 fffff800`02c88f35 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x187
fffff880`063e1b30 fffff800`02c7c5e3 : 00000000`00b7f850 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`063e1b60 fffff960`001abdc1 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`050eadb0 : nt! ?? ::FNODOBFM::`string'+0x49ae4
fffff880`063e1b90 fffff800`02cdaf93 : fffffa80`05bcfb60 00000000`00000000 00000000`00000020 00000000`00000000 : win32k!NtUserGetMessage+0xa1
fffff880`063e1c20 00000000`76c29e6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00b7f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76c29e6a

STACK_COMMAND:  kb
FOLLOWUP_IP: 
win32k!NtUserGetMessage+a1
fffff960`001abdc1 8bc3            mov     eax,ebx
SYMBOL_STACK_INDEX:  6
SYMBOL_NAME:  win32k!NtUserGetMessage+a1
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: win32k
IMAGE_NAME:  win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4d6f104c
FAILURE_BUCKET_ID:  X64_0xA_win32k!NtUserGetMessage+a1
BUCKET_ID:  X64_0xA_win32k!NtUserGetMessage+a1
Followup: MachineOwner
---------
Code:
start end module name
fffff800`00bd2000 fffff800`00bdc000 kdcom kdcom.dll Sat Feb 05 16:52:49 2011 (4D4D8061)
fffff800`02c13000 fffff800`02c5c000 hal hal.dll Sat Nov 20 13:00:25 2010 (4CE7C669)
fffff800`02c5c000 fffff800`03245000 nt ntkrnlmp.exe Sat Apr 09 05:15:23 2011 (4D9FDD5B)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Sat Nov 20 09:20:43 2010 (4CE792EB)
fffff880`00c6c000 fffff880`00c79000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:29:09 2009 (4A5BDF65)
fffff880`00c79000 fffff880`00c8d000 PSHED PSHED.dll Tue Jul 14 02:32:23 2009 (4A5BE027)
fffff880`00c8d000 fffff880`00ceb000 CLFS CLFS.SYS Tue Jul 14 00:19:57 2009 (4A5BC11D)
fffff880`00ceb000 fffff880`00dab000 CI CI.dll Sat Nov 20 13:12:36 2010 (4CE7C944)
fffff880`00dab000 fffff880`00df7000 fltmgr fltmgr.sys Sat Nov 20 09:19:24 2010 (4CE7929C)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Sat Nov 20 09:19:15 2010 (4CE79293)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Fri Mar 19 16:18:18 2010 (4BA3A3CA)
fffff880`00e3c000 fffff880`00ee0000 Wdf01000 Wdf01000.sys Tue Jul 14 00:22:07 2009 (4A5BC19F)
fffff880`00ee0000 fffff880`00eef000 WDFLDR WDFLDR.SYS Tue Jul 14 00:19:54 2009 (4A5BC11A)
fffff880`00eef000 fffff880`00f46000 ACPI ACPI.sys Sat Nov 20 09:19:16 2010 (4CE79294)
fffff880`00f46000 fffff880`00f4f000 WMILIB WMILIB.SYS Tue Jul 14 00:19:51 2009 (4A5BC117)
fffff880`00f4f000 fffff880`00f59000 msisadrv msisadrv.sys Tue Jul 14 00:19:26 2009 (4A5BC0FE)
fffff880`00f59000 fffff880`00f8c000 pci pci.sys Sat Nov 20 09:19:11 2010 (4CE7928F)
fffff880`00f8c000 fffff880`00f99000 vdrvroot vdrvroot.sys Tue Jul 14 01:01:31 2009 (4A5BCADB)
fffff880`00f99000 fffff880`00fae000 partmgr partmgr.sys Sat Nov 20 09:20:00 2010 (4CE792C0)
fffff880`00fae000 fffff880`00fc3000 volmgr volmgr.sys Sat Nov 20 09:19:28 2010 (4CE792A0)
fffff880`00fc3000 fffff880`00fca000 pciide pciide.sys Tue Jul 14 00:19:49 2009 (4A5BC115)
fffff880`00fca000 fffff880`00fda000 PCIIDEX PCIIDEX.SYS Tue Jul 14 00:19:48 2009 (4A5BC114)
fffff880`00fda000 fffff880`00ff4000 mountmgr mountmgr.sys Sat Nov 20 09:19:21 2010 (4CE79299)
fffff880`00ff4000 fffff880`00ffd000 atapi atapi.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01060000 avgtdia avgtdia.sys Mon Apr 04 22:54:35 2011 (4D9A3E1B)
fffff880`01060000 fffff880`01081000 raspptp raspptp.sys Sat Nov 20 10:52:31 2010 (4CE7A86F)
fffff880`01081000 fffff880`0109b000 rassstp rassstp.sys Tue Jul 14 01:10:25 2009 (4A5BCCF1)
fffff880`0109e000 fffff880`010b2000 fileinfo fileinfo.sys Tue Jul 14 00:34:25 2009 (4A5BC481)
fffff880`010b2000 fffff880`01110000 msrpc msrpc.sys Sat Nov 20 09:21:56 2010 (4CE79334)
fffff880`01110000 fffff880`01182000 cng cng.sys Sat Nov 20 10:08:45 2010 (4CE79E2D)
fffff880`01182000 fffff880`011a4000 tdx tdx.sys Sat Nov 20 09:21:54 2010 (4CE79332)
fffff880`011a4000 fffff880`011b1000 TDI TDI.SYS Sat Nov 20 09:22:06 2010 (4CE7933E)
fffff880`011b1000 fffff880`011f6000 netbt netbt.sys Sat Nov 20 09:23:18 2010 (4CE79386)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Tue Jul 14 00:19:27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Tue Jul 14 00:19:45 2009 (4A5BC111)
fffff880`0121b000 fffff880`01226000 Msfs Msfs.SYS Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`01226000 fffff880`01237000 Npfs Npfs.SYS Tue Jul 14 00:19:48 2009 (4A5BC114)
fffff880`01242000 fffff880`013e5000 Ntfs Ntfs.sys Sat Nov 20 09:20:57 2010 (4CE792F9)
fffff880`013e5000 fffff880`01400000 ksecdd ksecdd.sys Sat Nov 20 09:21:15 2010 (4CE7930B)
fffff880`01400000 fffff880`01410000 watchdog watchdog.sys Tue Jul 14 00:37:35 2009 (4A5BC53F)
fffff880`01410000 fffff880`01419000 RDPCDD RDPCDD.sys Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff880`01419000 fffff880`01422000 rdpencdd rdpencdd.sys Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff880`01427000 fffff880`0151a000 ndis ndis.sys Sat Nov 20 09:23:30 2010 (4CE79392)
fffff880`0151a000 fffff880`0157a000 NETIO NETIO.SYS Sat Nov 20 09:23:13 2010 (4CE79381)
fffff880`0157a000 fffff880`015a5000 ksecpkg ksecpkg.sys Sat Nov 20 10:10:34 2010 (4CE79E9A)
fffff880`015a5000 fffff880`015b4000 avgmfx64 avgmfx64.sys Tue Mar 01 12:25:15 2011 (4D6CE5AB)
fffff880`015b4000 fffff880`015bd000 Null Null.SYS Tue Jul 14 00:19:37 2009 (4A5BC109)
fffff880`015bd000 fffff880`015c4000 Beep Beep.SYS Tue Jul 14 01:00:13 2009 (4A5BCA8D)
fffff880`015c4000 fffff880`015d2000 vga vga.sys Tue Jul 14 00:38:47 2009 (4A5BC587)
fffff880`015d2000 fffff880`015f7000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:38:51 2009 (4A5BC58B)
fffff880`015f7000 fffff880`01600000 rdprefmp rdprefmp.sys Tue Jul 14 01:16:35 2009 (4A5BCE63)
fffff880`01600000 fffff880`0160a000 AVGIDSEH AVGIDSEH.Sys Tue Feb 22 05:23:04 2011 (4D634838)
fffff880`0160a000 fffff880`01612000 AtiPcie AtiPcie.sys Tue May 05 16:00:22 2009 (4A005486)
fffff880`01612000 fffff880`01625000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
fffff880`01625000 fffff880`01648000 luafv luafv.sys Tue Jul 14 00:26:13 2009 (4A5BC295)
fffff880`01648000 fffff880`01672000 cdrom cdrom.sys Sat Nov 20 09:19:20 2010 (4CE79298)
fffff880`01677000 fffff880`0187b000 tcpip tcpip.sys Sat Nov 20 09:25:52 2010 (4CE79420)
fffff880`0187b000 fffff880`018c5000 fwpkclnt fwpkclnt.sys Sat Nov 20 09:21:37 2010 (4CE79321)
fffff880`018c5000 fffff880`01911000 volsnap volsnap.sys Sat Nov 20 09:20:08 2010 (4CE792C8)
fffff880`01911000 fffff880`01919000 spldr spldr.sys Mon May 11 17:56:27 2009 (4A0858BB)
fffff880`01919000 fffff880`01953000 rdyboost rdyboost.sys Sat Nov 20 09:43:10 2010 (4CE7982E)
fffff880`01953000 fffff880`01965000 mup mup.sys Tue Jul 14 00:23:45 2009 (4A5BC201)
fffff880`01965000 fffff880`0196e000 hwpolicy hwpolicy.sys Sat Nov 20 09:18:54 2010 (4CE7927E)
fffff880`0196e000 fffff880`019a8000 fvevol fvevol.sys Sat Nov 20 09:24:06 2010 (4CE793B6)
fffff880`019a8000 fffff880`019be000 disk disk.sys Tue Jul 14 00:19:57 2009 (4A5BC11D)
fffff880`019be000 fffff880`019ee000 CLASSPNP CLASSPNP.SYS Sat Nov 20 09:19:23 2010 (4CE7929B)
fffff880`019ee000 fffff880`019fa000 avgrkx64 avgrkx64.sys Wed Mar 16 14:06:34 2011 (4D80C3EA)
fffff880`02c00000 fffff880`02c1e000 dfsc dfsc.sys Sat Nov 20 09:26:31 2010 (4CE79447)
fffff880`02c1e000 fffff880`02c2f000 blbdrive blbdrive.sys Tue Jul 14 00:35:59 2009 (4A5BC4DF)
fffff880`02c2f000 fffff880`02c5e000 ndiswan ndiswan.sys Sat Nov 20 10:52:32 2010 (4CE7A870)
fffff880`02c61000 fffff880`02cea000 afd afd.sys Sat Nov 20 09:23:27 2010 (4CE7938F)
fffff880`02cea000 fffff880`02cf3000 wfplwf wfplwf.sys Tue Jul 14 01:09:26 2009 (4A5BCCB6)
fffff880`02cf3000 fffff880`02d19000 pacer pacer.sys Sat Nov 20 10:52:18 2010 (4CE7A862)
fffff880`02d19000 fffff880`02d28000 netbios netbios.sys Tue Jul 14 01:09:26 2009 (4A5BCCB6)
fffff880`02d28000 fffff880`02d45000 serial serial.sys Tue Jul 14 01:00:40 2009 (4A5BCAA8)
fffff880`02d45000 fffff880`02d60000 wanarp wanarp.sys Sat Nov 20 10:52:36 2010 (4CE7A874)
fffff880`02d60000 fffff880`02d74000 termdd termdd.sys Sat Nov 20 11:03:40 2010 (4CE7AB0C)
fffff880`02d74000 fffff880`02dc5000 rdbss rdbss.sys Sat Nov 20 09:27:51 2010 (4CE79497)
fffff880`02dc5000 fffff880`02dd1000 nsiproxy nsiproxy.sys Tue Jul 14 00:21:02 2009 (4A5BC15E)
fffff880`02dd1000 fffff880`02ddc000 mssmbios mssmbios.sys Tue Jul 14 00:31:10 2009 (4A5BC3BE)
fffff880`02ddc000 fffff880`02deb000 discache discache.sys Tue Jul 14 00:37:18 2009 (4A5BC52E)
fffff880`02deb000 fffff880`02dfa000 mouclass mouclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
fffff880`03400000 fffff880`0342d000 mrxsmb mrxsmb.sys Wed Feb 23 04:56:22 2011 (4D649376)
fffff880`0342d000 fffff880`0347a000 mrxsmb10 mrxsmb10.sys Wed Feb 23 04:55:12 2011 (4D649330)
fffff880`0347a000 fffff880`0349e000 mrxsmb20 mrxsmb20.sys Wed Feb 23 04:55:12 2011 (4D649330)
fffff880`0349e000 fffff880`034a9000 AVGIDSFilter AVGIDSFilter.Sys Thu Feb 10 04:59:37 2011 (4D5370B9)
fffff880`034b6000 fffff880`034cb000 lltdio lltdio.sys Tue Jul 14 01:08:50 2009 (4A5BCC92)
fffff880`034cb000 fffff880`034e3000 rspndr rspndr.sys Tue Jul 14 01:08:50 2009 (4A5BCC92)
fffff880`034e3000 fffff880`035ac000 HTTP HTTP.sys Sat Nov 20 09:24:30 2010 (4CE793CE)
fffff880`035ac000 fffff880`035ca000 bowser bowser.sys Wed Feb 23 04:55:04 2011 (4D649328)
fffff880`035ca000 fffff880`035e2000 mpsdrv mpsdrv.sys Tue Jul 14 01:08:25 2009 (4A5BCC79)
fffff880`03a00000 fffff880`03a1b000 raspppoe raspppoe.sys Tue Jul 14 01:10:17 2009 (4A5BCCE9)
fffff880`03a1b000 fffff880`03a29000 monitor monitor.sys Tue Jul 14 00:38:52 2009 (4A5BC58C)
fffff880`03a29000 fffff880`03a78000 avgldx64 avgldx64.sys Fri Jan 07 04:36:39 2011 (4D269857)
fffff880`03a78000 fffff880`03a7f000 AsIO AsIO.sys Mon Dec 17 09:11:49 2007 (47663D55)
fffff880`03a7f000 fffff880`03aa5000 tunnel tunnel.sys Sat Nov 20 10:51:50 2010 (4CE7A846)
fffff880`03aa5000 fffff880`03aba000 amdppm amdppm.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
fffff880`03aba000 fffff880`03b05000 atikmpag atikmpag.sys Wed Nov 10 02:18:51 2010 (4CDA010B)
fffff880`03b05000 fffff880`03bf9000 dxgkrnl dxgkrnl.sys Sat Nov 20 09:50:50 2010 (4CE799FA)
fffff880`04000000 fffff880`0400c000 serenum serenum.sys Tue Jul 14 01:00:33 2009 (4A5BCAA1)
fffff880`0400c000 fffff880`04015000 wmiacpi wmiacpi.sys Tue Jul 14 00:31:02 2009 (4A5BC3B6)
fffff880`04015000 fffff880`04025000 CompositeBus CompositeBus.sys Sat Nov 20 10:33:17 2010 (4CE7A3ED)
fffff880`04025000 fffff880`0403b000 AgileVpn AgileVpn.sys Tue Jul 14 01:10:24 2009 (4A5BCCF0)
fffff880`0403b000 fffff880`0405f000 rasl2tp rasl2tp.sys Sat Nov 20 10:52:34 2010 (4CE7A872)
fffff880`0405f000 fffff880`0406b000 ndistapi ndistapi.sys Tue Jul 14 01:10:00 2009 (4A5BCCD8)
fffff880`0406b000 fffff880`0407a000 kbdclass kbdclass.sys Tue Jul 14 00:19:50 2009 (4A5BC116)
fffff880`0407b000 fffff880`040c1000 dxgmms1 dxgmms1.sys Sat Nov 20 09:49:53 2010 (4CE799C1)
fffff880`040c1000 fffff880`040e5000 HDAudBus HDAudBus.sys Sat Nov 20 10:43:42 2010 (4CE7A65E)
fffff880`040e5000 fffff880`04155000 Rt64win7 Rt64win7.sys Mon Mar 21 13:20:32 2011 (4D8750A0)
fffff880`04155000 fffff880`04160000 usbohci usbohci.sys Tue Jul 14 01:06:30 2009 (4A5BCC06)
fffff880`04160000 fffff880`041b6000 USBPORT USBPORT.SYS Sat Nov 20 10:44:00 2010 (4CE7A670)
fffff880`041b6000 fffff880`041c3000 usbfilter usbfilter.sys Thu Apr 29 11:43:06 2010 (4BD962BA)
fffff880`041c3000 fffff880`041d4000 usbehci usbehci.sys Sat Nov 20 10:43:54 2010 (4CE7A66A)
fffff880`041d4000 fffff880`041f1000 parport parport.sys Tue Jul 14 01:00:40 2009 (4A5BCAA8)
fffff880`041f1000 fffff880`041f9000 ASACPI ASACPI.sys Thu May 14 02:25:17 2009 (4A0B72FD)
fffff880`041f9000 fffff880`041fa480 swenum swenum.sys Tue Jul 14 01:00:18 2009 (4A5BCA92)
fffff880`04200000 fffff880`04219000 HIDCLASS HIDCLASS.SYS Sat Nov 20 10:43:49 2010 (4CE7A665)
fffff880`04234000 fffff880`04242000 crashdmp crashdmp.sys Tue Jul 14 01:01:01 2009 (4A5BCABD)
fffff880`04242000 fffff880`0424e000 dump_dumpata dump_dumpata.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`0424e000 fffff880`04257000 dump_atapi dump_atapi.sys Tue Jul 14 00:19:47 2009 (4A5BC113)
fffff880`04257000 fffff880`04263000 Dxapi Dxapi.sys Tue Jul 14 00:38:28 2009 (4A5BC574)
fffff880`04269000 fffff880`042ac000 ks ks.sys Sat Nov 20 10:33:23 2010 (4CE7A3F3)
fffff880`042ac000 fffff880`042be000 umbus umbus.sys Sat Nov 20 10:44:37 2010 (4CE7A695)
fffff880`042be000 fffff880`04318000 usbhub usbhub.sys Sat Nov 20 10:44:30 2010 (4CE7A68E)
fffff880`04318000 fffff880`0432d000 NDProxy NDProxy.SYS Sat Nov 20 10:52:20 2010 (4CE7A864)
fffff880`0432d000 fffff880`0434d000 AtihdW76 AtihdW76.sys Fri Sep 24 06:44:48 2010 (4C9C3AD0)
fffff880`0434d000 fffff880`0438a000 portcls portcls.sys Tue Jul 14 01:06:27 2009 (4A5BCC03)
fffff880`0438a000 fffff880`043ac000 drmk drmk.sys Tue Jul 14 02:01:25 2009 (4A5BD8E5)
fffff880`043ac000 fffff880`043b1200 ksthunk ksthunk.sys Tue Jul 14 01:00:19 2009 (4A5BCA93)
fffff880`043b2000 fffff880`043c2000 dot4usb dot4usb.sys Tue Jul 14 01:00:20 2009 (4A5BCA94)
fffff880`043c2000 fffff880`043ea000 Dot4 Dot4.sys Tue Jul 14 01:00:16 2009 (4A5BCA90)
fffff880`043ea000 fffff880`043f8000 hidusb hidusb.sys Sat Nov 20 10:43:49 2010 (4CE7A665)
fffff880`04804000 fffff880`04ffa000 atikmdag atikmdag.sys Wed Nov 10 02:46:47 2010 (4CDA0797)
fffff880`05800000 fffff880`05808080 HIDPARSE HIDPARSE.SYS Tue Jul 14 01:06:17 2009 (4A5BCBF9)
fffff880`0580b000 fffff880`059b9000 viahduaa viahduaa.sys Mon Jan 11 10:05:18 2010 (4B4AF7DE)
fffff880`059b9000 fffff880`059d6000 usbccgp usbccgp.sys Sat Nov 20 10:44:03 2010 (4CE7A673)
fffff880`059d6000 fffff880`059d7f00 USBD USBD.SYS Tue Jul 14 01:06:23 2009 (4A5BCBFF)
fffff880`059d8000 fffff880`059e9000 usbscan usbscan.sys Tue Jul 14 01:35:32 2009 (4A5BD2D4)
fffff880`059e9000 fffff880`059f5000 usbprint usbprint.sys Tue Jul 14 01:38:18 2009 (4A5BD37A)
fffff880`059f5000 fffff880`059ff000 Dot4Prt Dot4Prt.sys Sat Nov 20 10:32:44 2010 (4CE7A3CC)
fffff880`05a00000 fffff880`05a6a000 srv2 srv2.sys Wed Feb 23 04:56:00 2011 (4D649360)
fffff880`05a97000 fffff880`05b3d000 peauth peauth.sys Tue Jul 14 02:01:19 2009 (4A5BD8DF)
fffff880`05b3d000 fffff880`05b48000 secdrv secdrv.SYS Wed Sep 13 14:18:38 2006 (4508052E)
fffff880`05b48000 fffff880`05b79000 srvnet srvnet.sys Wed Feb 23 04:55:44 2011 (4D649350)
fffff880`05b79000 fffff880`05b8b000 tcpipreg tcpipreg.sys Sat Nov 20 10:51:48 2010 (4CE7A844)
fffff880`05b8b000 fffff880`05bb6000 AVGIDSDriver AVGIDSDriver.Sys Thu Apr 14 18:11:05 2011 (4DA72AA9)
fffff880`07000000 fffff880`07071000 spsys spsys.sys Mon May 11 18:20:58 2009 (4A085E7A)
fffff880`070fd000 fffff880`07195000 srv srv.sys Wed Feb 23 04:56:21 2011 (4D649375)
fffff880`071be000 fffff880`071cb000 mouhid mouhid.sys Tue Jul 14 01:00:20 2009 (4A5BCA94)
fffff880`071cb000 fffff880`071d9000 kbdhid kbdhid.sys Sat Nov 20 10:33:25 2010 (4CE7A3F5)
fffff960`000e0000 fffff960`003f2000 win32k win32k.sys Thu Mar 03 03:51:40 2011 (4D6F104C)
fffff960`00560000 fffff960`0056a000 TSDDD TSDDD.dll Tue Jul 14 01:16:34 2009 (4A5BCE62)
fffff960`00640000 fffff960`00667000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`071b0000 fffff880`071be000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`071a3000 fffff880`071b0000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`07195000 fffff880`071a3000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`04227000 fffff880`04234000 mouhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
fffff880`04219000 fffff880`04227000 kbdhid.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01612000 fffff880`01620000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01620000 fffff880`0162c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0162c000 fffff880`01635000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01635000 fffff880`01648000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
 
It needs about 7 passes per stick :)

Just making sure, but are you saying that I should run through about 7 passes with each stick installed individually?

Also, I'd like to add a bit more information. The computer has locked up on me a couple of times while idle. I had to restart it via the restart button each time. Does this point to anything specific?
 
Did 7 passes per stick and no errors. Any other tests I should run? I also checked the mboard manual and there is a list of "qualified" memory that does not include the part number for the memory I bought, though several other g.skill part numbers are on the list... issue?
 
Last dump files are showing Memory Management. Refer the Motherboard manual and make sure the timing and voltages are set correctly in BIOS.

Code:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa80032be2d0
Arg3: fffffa80032ca330
Arg4: 0000000000000600

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_8884

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002d3f4e6 to fffff80002c9ad00

STACK_TEXT:  
fffff880`060918b8 fffff800`02d3f4e6 : 00000000`0000001a 00000000`00008884 fffffa80`032be2d0 fffffa80`032ca330 : nt!KeBugCheckEx
fffff880`060918c0 fffff800`02d9f735 : fffffa80`03832d60 fffffa80`0383b000 00000000`00000000 00000000`00000020 : nt!MiRelinkStandbyPage+0xc6
fffff880`06091930 fffff800`030a8954 : fffffa80`03832000 fffff880`06091ca0 fffff880`06091a08 00000000`0199ba01 : nt!MmSetPfnListPriorities+0x175
fffff880`06091980 fffff800`0310a3ca : 00000000`00000020 00000000`00000000 fffffa80`03832000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`060919d0 fffff800`0310ec0a : 00000000`00000000 00000000`0000004f 00000000`00000000 fffff800`02c9d601 : nt!PfSetSuperfetchInformation+0x199
fffff880`06091ab0 fffff800`02c99f93 : fffffa80`05961060 00000000`02df5480 00000000`02df83d8 00000000`064c6710 : nt!NtSetSystemInformation+0xc8d
fffff880`06091c20 00000000`76e42a0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0199b9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e42a0a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiRelinkStandbyPage+c6
fffff800`02d3f4e6 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiRelinkStandbyPage+c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd5b

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_8884_nt!MiRelinkStandbyPage+c6

BUCKET_ID:  X64_0x1a_8884_nt!MiRelinkStandbyPage+c6

Followup: MachineOwner
---------
 
Well, the damn auto voltage was set at 1.5v and the ram is 1.8v so I upped that. I hope this fixes the problem and I will report back if I get any BSODs. Thanks!
 
Back
Top