Windows 7 nvlddmkm.sys

Tommorow I will take my pc to a tehnician because i'm sick of this.
I'll hope they will fix this.
Thx for help.
I will reply after that to see if the BSOD is fixed.
 
Hi again.
I'm back with some new info.
Now i don't get nvlddmkm.sys BSOD,instead i get nv4_mini.sys.
It's kinda better because i get it 2 times/week.
But if I could solve this BSOD too i will be much hapier.
Here's the dump file : 2shared - download Minidump.rar
And yes,I forgot to say how i solved the previous error.
I've underclocked my CPU in the BIOS menu.
 
Glad you're back but upset that you're having blue screens.

Nv4_mini.sys is nVidia Compatible Miniport Driver:


BugCheck 100000D1, {0, 2, 0, b76d81a1}
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.
CURRENT_IRQL: 2
PROCESS_NAME: Idle
STACK_TEXT:
805510fc 00000000 8a026008 8a026008 00000000 nv4_mini+0x2a11a1
Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )
b7437000 b7da53a0 nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)


I've underclocked my CPU in the BIOS menu.

1. Attach your new snapshots,

- memory
- Rammon


2. I guess we went through this already on page 1 of this thread, but again: if the memory is compatible with the motherboard, you should be able to set it right without under- or over- clocking. For DDR667 and 800 the "Auto" option does the job. Of course the sticks should match too, either 667 or 800, not combined.


3.
Tommorow I will take my pc to a tehnician because i'm sick of this.
I'll hope they will fix this.
Thx for help.
I will reply after that to see if the BSOD is fixed.

What is the outcome, what did the technician say?



4. Your system crashes at idle, that's likely caused by your RAM again. Or motherboard, or the video card. Ensure correct RAM settings 1st.











Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Mar 12 05:37:29.000 2011 (UTC - 5:00)
System Uptime: 0 days 2:21:35.609
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
..........
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {0, 2, 0, b76d81a1}

Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  00000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  Idle

LAST_CONTROL_TRANSFER:  from 00000000 to b76d81a1

STACK_TEXT:  
805510fc 00000000 8a025008 8a025008 00000000 nv4_mini+0x2a11a1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nv4_mini+2a11a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nv4_mini

IMAGE_NAME:  nv4_mini.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c238

FAILURE_BUCKET_ID:  0xD1_nv4_mini+2a11a1

BUCKET_ID:  0xD1_nv4_mini+2a11a1

Followup: MachineOwner
---------




























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Mar 11 07:42:58.671 2011 (UTC - 5:00)
System Uptime: 0 days 1:22:00.414
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
.............
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {0, 2, 0, b76d81a1}

Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  00000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  Idle

LAST_CONTROL_TRANSFER:  from 00000000 to b76d81a1

STACK_TEXT:  
805510fc 00000000 8a026008 8a026008 00000000 nv4_mini+0x2a11a1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nv4_mini+2a11a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nv4_mini

IMAGE_NAME:  nv4_mini.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c238

FAILURE_BUCKET_ID:  0xD1_nv4_mini+2a11a1

BUCKET_ID:  0xD1_nv4_mini+2a11a1

Followup: MachineOwner
---------























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031211-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Mar 12 07:04:25.609 2011 (UTC - 5:00)
System Uptime: 0 days 1:25:40.328
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
............
Unable to load image nv4_mini.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nv4_mini.sys
*** ERROR: Module load completed but symbols could not be loaded for nv4_mini.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {0, 2, 0, b76d81a1}

Probably caused by : nv4_mini.sys ( nv4_mini+2a11a1 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: b76d81a1, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  00000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  Idle

LAST_CONTROL_TRANSFER:  from 00000000 to b76d81a1

STACK_TEXT:  
805510fc 00000000 8a0be438 8a0be438 00000000 nv4_mini+0x2a11a1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nv4_mini+2a11a1
b76d81a1 8b09            mov     ecx,dword ptr [ecx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nv4_mini+2a11a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nv4_mini

IMAGE_NAME:  nv4_mini.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c238

FAILURE_BUCKET_ID:  0xD1_nv4_mini+2a11a1

BUCKET_ID:  0xD1_nv4_mini+2a11a1

Followup: MachineOwner
---------




Drivers:

Code:
start    end        module name
b1750000 b177c000   000      000.fcl      Fri Sep 26 09:11:12 2008 (48DCDF70)
b7f79000 b7fa6d80   ACPI     ACPI.sys     Sun Apr 13 14:36:33 2008 (480252B1)
b2773000 b2794b80   afd      afd.sys      Sun Apr 13 15:19:22 2008 (48025CBA)
b7f0b000 b7f22900   atapi    atapi.sys    Sun Apr 13 14:40:29 2008 (4802539D)
b81d8000 b81e0b80   atl01_xp atl01_xp.sys Tue Aug 22 01:36:57 2006 (44EA97F9)
b8733000 b8733c00   audstub  audstub.sys  Fri Aug 17 16:59:40 2001 (3B7D85BC)
b85ca000 b85cb080   Beep     Beep.SYS     Fri Aug 17 16:47:33 2001 (3B7D82E5)
b84b8000 b84bb000   BOOTVID  BOOTVID.dll  Fri Aug 17 16:49:09 2001 (3B7D8345)
b8148000 b8157900   Cdfs     Cdfs.SYS     Sun Apr 13 15:14:21 2008 (48025B8D)
b81f8000 b8207600   cdrom    cdrom.sys    Sun Apr 13 14:40:45 2008 (480253AD)
b80e8000 b80f4180   CLASSPNP CLASSPNP.SYS Sun Apr 13 15:16:21 2008 (48025C05)
b1bab000 b1bb4000   cpuz135_x32 cpuz135_x32.sys Wed Jan 19 11:45:17 2011 (4D37151D)
b80d8000 b80e0e00   disk     disk.sys     Sun Apr 13 14:40:46 2008 (480253AE)
b7f23000 b7f48700   dmio     dmio.sys     Sun Apr 13 14:44:45 2008 (4802549D)
b85ae000 b85af700   dmload   dmload.sys   Fri Aug 17 16:58:15 2001 (3B7D8567)
b82a8000 b82b6b00   drmk     drmk.sys     Sun Apr 13 14:45:12 2008 (480254B8)
b7270000 b72ab000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:15:09 2011 (4D2EB48D)
b2698000 b26af900   dump_atapi dump_atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b85da000 b85db100   dump_WMILIB dump_WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
b4a03000 b4a05900   Dxapi    Dxapi.sys    Fri Aug 17 16:53:19 2001 (3B7D843F)
bd000000 bd011600   dxg      dxg.sys      Sun Apr 13 14:38:27 2008 (48025323)
b8763000 b8763d00   dxgthk   dxgthk.sys   Fri Aug 17 16:53:12 2001 (3B7D8438)
b83a8000 b83a9000   fdc      fdc.sys      unavailable (00000000)
b8128000 b8132e00   Fips     Fips.SYS     Sun Apr 13 14:33:27 2008 (480251F7)
b8400000 b8405000   flpydisk flpydisk.sys Sun Apr 13 14:40:24 2008 (48025398)
b7eeb000 b7f0ab00   fltMgr   fltMgr.sys   Sun Apr 13 14:32:58 2008 (480251DA)
b85c8000 b85c9f00   Fs_Rec   Fs_Rec.SYS   Fri Aug 17 16:49:37 2001 (3B7D8361)
b7f49000 b7f67880   ftdisk   ftdisk.sys   Fri Aug 17 16:52:41 2001 (3B7D8419)
806e4000 80704d00   hal      halmacpi.dll Sun Apr 13 14:31:27 2008 (4802517F)
b7389000 b73b1000   HDAudBus HDAudBus.sys Thu May 26 11:46:29 2005 (4295EF55)
b1312000 b1352a80   HTTP     HTTP.sys     Sun Apr 13 14:53:48 2008 (480256BC)
b8228000 b8234d00   i8042prt i8042prt.sys Sun Apr 13 15:17:59 2008 (48025C67)
b81e8000 b81f2480   imapi    imapi.sys    Sun Apr 13 14:40:57 2008 (480253B9)
b2795000 b27ba500   ipnat    ipnat.sys    Sun Apr 13 14:57:10 2008 (48025786)
b2864000 b2876600   ipsec    ipsec.sys    Sun Apr 13 15:19:42 2008 (48025CCE)
b80a8000 b80b1180   isapnp   isapnp.sys   Sun Apr 13 14:36:40 2008 (480252B8)
b83b0000 b83b6000   kbdclass kbdclass.sys Sun Apr 13 14:39:46 2008 (48025372)
b85a8000 b85a9b80   kdcom    kdcom.dll    Fri Aug 17 16:49:10 2001 (3B7D8346)
b0eeb000 b0f15180   kmixer   kmixer.sys   Sun Apr 13 14:45:07 2008 (480254B3)
b7400000 b7422700   ks       ks.sys       Sun Apr 13 15:16:34 2008 (48025C12)
b7ec2000 b7ed8880   KSecDD   KSecDD.sys   Sun Apr 13 14:31:40 2008 (4802518C)
b85cc000 b85cd080   mnmdd    mnmdd.SYS    Fri Aug 17 16:57:28 2001 (3B7D8538)
b83b8000 b83bda00   mouclass mouclass.sys Sun Apr 13 14:39:47 2008 (48025373)
b80b8000 b80c2580   MountMgr MountMgr.sys Sun Apr 13 14:39:45 2008 (48025371)
b18e6000 b1912180   mrxdav   mrxdav.sys   Sun Apr 13 14:32:42 2008 (480251CA)
b26d8000 b2747780   mrxsmb   mrxsmb.sys   Sun Apr 13 15:16:58 2008 (48025C2A)
b8418000 b841ca80   Msfs     Msfs.SYS     Sun Apr 13 14:32:38 2008 (480251C6)
b8268000 b8270900   msgpc    msgpc.sys    Sun Apr 13 14:56:32 2008 (48025760)
b8574000 b8577c80   mssmbios mssmbios.sys Sun Apr 13 14:36:45 2008 (480252BD)
b7dee000 b7e07b80   Mup      Mup.sys      Sun Apr 13 15:17:05 2008 (48025C31)
b7e08000 b7e34980   NDIS     NDIS.sys     Sun Apr 13 15:20:35 2008 (48025D03)
b8554000 b8556780   ndistapi ndistapi.sys Sun Apr 13 14:57:27 2008 (48025797)
b1c27000 b1c2a900   ndisuio  ndisuio.sys  Sun Apr 13 14:55:57 2008 (4802573D)
b7372000 b7388580   ndiswan  ndiswan.sys  Sun Apr 13 15:20:41 2008 (48025D09)
b82b8000 b82c1e80   NDProxy  NDProxy.SYS  Sun Apr 13 14:57:28 2008 (48025798)
b8318000 b8320780   netbios  netbios.sys  Sun Apr 13 14:56:01 2008 (48025741)
b27bb000 b27e2c00   netbt    netbt.sys    Sun Apr 13 15:20:59 2008 (48025D1B)
b8420000 b8427880   Npfs     Npfs.SYS     Sun Apr 13 14:32:38 2008 (480251C6)
804d7000 806e4000   nt       ntkrpamp.exe Sun Apr 13 14:31:06 2008 (4802516A)
b7e35000 b7ec1600   Ntfs     Ntfs.sys     Sun Apr 13 15:15:49 2008 (48025BE5)
b86f0000 b86f0b80   Null     Null.SYS     Fri Aug 17 16:47:39 2001 (3B7D82EB)
bd012000 bd62bf80   nv4_disp nv4_disp.dll Fri Jan 07 20:45:10 2011 (4D27C1A6)
b7437000 b7da53a0   nv4_mini nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)
b73b1000 b73c4900   parport  parport.sys  Sun Apr 13 14:40:09 2008 (48025389)
b8330000 b8334d00   PartMgr  PartMgr.sys  Sun Apr 13 14:40:48 2008 (480253B0)
b861c000 b861da80   ParVdm   ParVdm.SYS   Fri Aug 17 16:49:49 2001 (3B7D836D)
b7f68000 b7f78a80   pci      pci.sys      Sun Apr 13 14:36:43 2008 (480252BB)
b8670000 b8670d00   pciide   pciide.sys   Fri Aug 17 16:51:49 2001 (3B7D83E5)
b8328000 b832e180   PCIIDEX  PCIIDEX.SYS  Sun Apr 13 14:40:29 2008 (4802539D)
b4ac7000 b4aeaa80   portcls  portcls.sys  Sun Apr 13 15:19:40 2008 (48025CCC)
b81c8000 b81d0c00   processr processr.sys Sun Apr 13 14:31:29 2008 (48025181)
b7361000 b7371e00   psched   psched.sys   Sun Apr 13 14:56:36 2008 (48025764)
b83c8000 b83cc580   ptilink  ptilink.sys  Fri Aug 17 16:49:53 2001 (3B7D8371)
b7329000 b732b280   rasacd   rasacd.sys   Fri Aug 17 16:55:39 2001 (3B7D84CB)
b8238000 b8244880   rasl2tp  rasl2tp.sys  Sun Apr 13 15:19:43 2008 (48025CCF)
b8248000 b8252200   raspppoe raspppoe.sys Sun Apr 13 14:57:31 2008 (4802579B)
b8258000 b8263d00   raspptp  raspptp.sys  Sun Apr 13 15:19:47 2008 (48025CD3)
b83d0000 b83d4080   raspti   raspti.sys   Fri Aug 17 16:55:32 2001 (3B7D84C4)
b2748000 b2772e80   rdbss    rdbss.sys    Sun Apr 13 15:28:38 2008 (48025EE6)
b85ce000 b85cf080   RDPCDD   RDPCDD.sys   Fri Aug 17 16:46:56 2001 (3B7D82C0)
b7331000 b7360e80   rdpdr    rdpdr.sys    Sun Apr 13 14:32:50 2008 (480251D2)
b8208000 b8216100   redbook  redbook.sys  Sun Apr 13 14:40:27 2008 (4802539B)
b4aeb000 b5133000   RtkHDAud RtkHDAud.sys Tue Jan 25 05:25:41 2011 (4D3EA525)
b8550000 b8553d80   serenum  serenum.sys  Sun Apr 13 14:40:12 2008 (4802538C)
b8218000 b8227c00   serial   serial.sys   Sun Apr 13 15:15:44 2008 (48025BE0)
b7ed9000 b7eeaf00   sr       sr.sys       Sun Apr 13 14:36:50 2008 (480252C2)
b17a4000 b17f5c00   srv      srv.sys      Sun Apr 13 15:15:08 2008 (48025BBC)
b85c0000 b85c1100   swenum   swenum.sys   Sun Apr 13 14:39:52 2008 (48025378)
b16c0000 b16ced80   sysaudio sysaudio.sys Sun Apr 13 15:15:55 2008 (48025BEB)
b280b000 b2863380   tcpip    tcpip.sys    Sun Apr 13 15:20:12 2008 (48025CEC)
b83c0000 b83c4a80   TDI      TDI.SYS      Sun Apr 13 15:00:04 2008 (48025834)
b8298000 b82a1f00   termdd   termdd.sys   Sun Apr 13 14:38:36 2008 (4802532C)
b10f9000 b1109200   Udfs     Udfs.SYS     Sun Apr 13 14:32:35 2008 (480251C3)
b72ab000 b7308f00   update   update.sys   Sun Apr 13 14:39:46 2008 (48025372)
b85c6000 b85c7280   USBD     USBD.SYS     Fri Aug 17 17:02:58 2001 (3B7D8682)
b83a0000 b83a7600   usbehci  usbehci.sys  Sun Apr 13 14:45:34 2008 (480254CE)
b82e8000 b82f6880   usbhub   usbhub.sys   Sun Apr 13 14:45:36 2008 (480254D0)
b73c5000 b73e8200   USBPORT  USBPORT.SYS  Sun Apr 13 14:45:34 2008 (480254CE)
b8398000 b839d080   usbuhci  usbuhci.sys  Sun Apr 13 14:45:34 2008 (480254CE)
b8410000 b8415200   vga      vga.sys      Sun Apr 13 14:44:40 2008 (48025498)
b85ac000 b85ad500   viaide   viaide.sys   Sun Apr 13 14:40:30 2008 (4802539E)
b7423000 b7436f00   VIDEOPRT VIDEOPRT.SYS Sun Apr 13 14:44:39 2008 (48025497)
b80c8000 b80d4c80   VolSnap  VolSnap.sys  Sun Apr 13 14:41:00 2008 (480253BC)
b8308000 b8310700   wanarp   wanarp.sys   Sun Apr 13 14:57:20 2008 (48025790)
b8428000 b842c500   watchdog watchdog.sys Sun Apr 13 14:44:59 2008 (480254AB)
b15fb000 b160f480   wdmaud   wdmaud.sys   Sun Apr 13 15:17:18 2008 (48025C3E)
bf800000 bf9c2980   win32k   win32k.sys   Sun Apr 13 15:29:46 2008 (48025F2A)
b85aa000 b85ab100   WMILIB   WMILIB.SYS   Fri Aug 17 17:07:23 2001 (3B7D878B)

Unloaded modules:
b861e000 b8620000   splitter.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
b0eeb000 b0f16000   kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
b0eeb000 b0f16000   kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
b0fde000 b1009000   kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
b150d000 b1538000   kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
b87ab000 b87ac000   drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00001000
b16a0000 b16ad000   DMusic.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
b1538000 b155b000   aec.sys 
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00023000
b16b0000 b16be000   swmidi.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
b85c4000 b85c6000   splitter.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
b8408000 b840d000   Cdaudio.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00005000
b732d000 b7330000   Sfloppy.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
 
Last edited:
You got the memory timings wrong.
Right now: 800mhz 5-6-6-18.
Should be: 800mhz 5-5-5-18.
 
The memory is set right at the moment: 800 5-5-5-18. But your crash dumps again point to memory_corruption.



Mini031611-01.dmp
BugCheck 1000000A, {f83150bc, 1, 0, 80505f07}
PROCESS_NAME: uTorrent.exe
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )

Mini031611-02.dmp
BugCheck 10000050, {e0188cfc, 0, 80505f07, 0}
PROCESS_NAME: chrome.exe
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )



Bugs 101, 116, 0x50 (memory_corruption) - blame your hardware.




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031611-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Mar 16 02:56:53.265 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:22.990
Loading Kernel Symbols
...............................................................
...............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {f83150bc, 1, 0, 80505f07}

Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: f83150bc, memory referenced
Arg2: 00000001, IRQL
Arg3: 00000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80505f07, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  f83150bc 

CURRENT_IRQL:  1

FAULTING_IP: 
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81          mov     ecx,dword ptr [ecx+eax*4]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  uTorrent.exe

LAST_CONTROL_TRANSFER:  from 8051af4d to 80505f07

STACK_TEXT:  
b1432b38 8051af4d c0e0003c d323a000 00000000 nt!MiLocateAndReserveWsle+0x51
b1432b8c 805696dc d323a000 00000000 b1432cd8 nt!MmCheckCachedPageState+0x4ed
b1432c1c b7e55e9a 898ee450 027eb074 00020000 nt!CcFastCopyRead+0x152
b1432c74 b7ee09a2 898ee450 b1432cd8 00020000 Ntfs!NtfsCopyReadA+0x1bf
b1432c9c 8057c74e 898ee450 b1432cd8 00020000 sr!SrFastIoRead+0x40
b1432d38 8054161c 00000280 00000000 00000000 nt!NtReadFile+0x2c4
b1432d38 7c90e4f4 00000280 00000000 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0103fe74 00000000 00000000 00000000 00000000 0x7c90e4f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81          mov     ecx,dword ptr [ecx+eax*4]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLocateAndReserveWsle+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4802516a

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0xA_nt!MiLocateAndReserveWsle+51

BUCKET_ID:  0xA_nt!MiLocateAndReserveWsle+51

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\Mini031611-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Mar 16 03:02:08.796 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:30.543
Loading Kernel Symbols
...............................................................
...........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {e0188cfc, 0, 80505f07, 0}


Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiLocateAndReserveWsle+51 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e0188cfc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 80505f07, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS:  e0188cfc 

FAULTING_IP: 
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81          mov     ecx,dword ptr [ecx+eax*4]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  chrome.exe

LAST_CONTROL_TRANSFER:  from 80513abe to 80505f07

STACK_TEXT:  
b1005bc8 80513abe c0883cfc 77dd5ad1 8124dbb4 nt!MiLocateAndReserveWsle+0x51
b1005be0 805152b9 77dd5ad1 c03beea8 8124dbb4 nt!MiAddValidPageToWorkingSet+0x84
b1005c18 805163b8 80000000 77dd5ad1 c03beea8 nt!MiCompleteProtoPteFault+0x1cb
b1005c5c 8051650f 00000000 77dd5ad1 c03beea8 nt!MiResolveProtoPteFault+0x204
b1005ce0 80520ad8 e175b070 77dd5ad1 c03beea8 nt!MiDispatchFault+0xf1
b1005d4c 80544578 00000000 77dd5ad1 00000001 nt!MmAccessFault+0x1116
b1005d4c 7c917c33 00000000 77dd5ad1 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012f9d0 00000000 00000000 00000000 00000000 0x7c917c33


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiLocateAndReserveWsle+51
80505f07 8b0c81          mov     ecx,dword ptr [ecx+eax*4]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLocateAndReserveWsle+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4802516a

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x50_nt!MiLocateAndReserveWsle+51

BUCKET_ID:  0x50_nt!MiLocateAndReserveWsle+51

Followup: MachineOwner
---------




Drivers:

Code:
start    end        module name
b1728000 b1754000   000      000.fcl      Fri Sep 26 09:11:12 2008 (48DCDF70)
b7f79000 b7fa6d80   ACPI     ACPI.sys     Sun Apr 13 14:36:33 2008 (480252B1)
b2773000 b2794b80   afd      afd.sys      Sun Apr 13 15:19:22 2008 (48025CBA)
b7f0b000 b7f22900   atapi    atapi.sys    Sun Apr 13 14:40:29 2008 (4802539D)
b81e8000 b81f0b80   atl01_xp atl01_xp.sys Tue Aug 22 01:36:57 2006 (44EA97F9)
b8750000 b8750c00   audstub  audstub.sys  Fri Aug 17 16:59:40 2001 (3B7D85BC)
b85c2000 b85c3080   Beep     Beep.SYS     Fri Aug 17 16:47:33 2001 (3B7D82E5)
b84b8000 b84bb000   BOOTVID  BOOTVID.dll  Fri Aug 17 16:49:09 2001 (3B7D8345)
b8178000 b8187900   Cdfs     Cdfs.SYS     Sun Apr 13 15:14:21 2008 (48025B8D)
b8208000 b8217600   cdrom    cdrom.sys    Sun Apr 13 14:40:45 2008 (480253AD)
b80e8000 b80f4180   CLASSPNP CLASSPNP.SYS Sun Apr 13 15:16:21 2008 (48025C05)
b1bb3000 b1bbc000   cpuz135_x32 cpuz135_x32.sys Wed Jan 19 11:45:17 2011 (4D37151D)
b80d8000 b80e0e00   disk     disk.sys     Sun Apr 13 14:40:46 2008 (480253AE)
b7f23000 b7f48700   dmio     dmio.sys     Sun Apr 13 14:44:45 2008 (4802549D)
b85ae000 b85af700   dmload   dmload.sys   Fri Aug 17 16:58:15 2001 (3B7D8567)
b8298000 b82a6b00   drmk     drmk.sys     Sun Apr 13 14:45:12 2008 (480254B8)
b71d0000 b720b000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:15:09 2011 (4D2EB48D)
b2698000 b26af900   dump_atapi dump_atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
b85cc000 b85cd100   dump_WMILIB dump_WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
b4a07000 b4a09900   Dxapi    Dxapi.sys    Fri Aug 17 16:53:19 2001 (3B7D843F)
bd000000 bd011600   dxg      dxg.sys      Sun Apr 13 14:38:27 2008 (48025323)
b86d3000 b86d3d00   dxgthk   dxgthk.sys   Fri Aug 17 16:53:12 2001 (3B7D8438)
b83b8000 b83b9000   fdc      fdc.sys      unavailable (00000000)
b82f8000 b8302e00   Fips     Fips.SYS     Sun Apr 13 14:33:27 2008 (480251F7)
b83e8000 b83ed000   flpydisk flpydisk.sys Sun Apr 13 14:40:24 2008 (48025398)
b7eeb000 b7f0ab00   fltMgr   fltMgr.sys   Sun Apr 13 14:32:58 2008 (480251DA)
b85c0000 b85c1f00   Fs_Rec   Fs_Rec.SYS   Fri Aug 17 16:49:37 2001 (3B7D8361)
b7f49000 b7f67880   ftdisk   ftdisk.sys   Fri Aug 17 16:52:41 2001 (3B7D8419)
806e4000 80704d00   hal      halmacpi.dll Sun Apr 13 14:31:27 2008 (4802517F)
b7389000 b73b1000   HDAudBus HDAudBus.sys Thu May 26 11:46:29 2005 (4295EF55)
b1312000 b1352a80   HTTP     HTTP.sys     Sun Apr 13 14:53:48 2008 (480256BC)
b8238000 b8244d00   i8042prt i8042prt.sys Sun Apr 13 15:17:59 2008 (48025C67)
b81f8000 b8202480   imapi    imapi.sys    Sun Apr 13 14:40:57 2008 (480253B9)
b2795000 b27ba500   ipnat    ipnat.sys    Sun Apr 13 14:57:10 2008 (48025786)
b283c000 b284e600   ipsec    ipsec.sys    Sun Apr 13 15:19:42 2008 (48025CCE)
b80a8000 b80b1180   isapnp   isapnp.sys   Sun Apr 13 14:36:40 2008 (480252B8)
b83c0000 b83c6000   kbdclass kbdclass.sys Sun Apr 13 14:39:46 2008 (48025372)
b85a8000 b85a9b80   kdcom    kdcom.dll    Fri Aug 17 16:49:10 2001 (3B7D8346)
b73e9000 b740b700   ks       ks.sys       Sun Apr 13 15:16:34 2008 (48025C12)
b7ec2000 b7ed8880   KSecDD   KSecDD.sys   Sun Apr 13 14:31:40 2008 (4802518C)
b85c4000 b85c5080   mnmdd    mnmdd.SYS    Fri Aug 17 16:57:28 2001 (3B7D8538)
b83c8000 b83cda00   mouclass mouclass.sys Sun Apr 13 14:39:47 2008 (48025373)
b80b8000 b80c2580   MountMgr MountMgr.sys Sun Apr 13 14:39:45 2008 (48025371)
b18e6000 b1912180   mrxdav   mrxdav.sys   Sun Apr 13 14:32:42 2008 (480251CA)
b26d8000 b2747780   mrxsmb   mrxsmb.sys   Sun Apr 13 15:16:58 2008 (48025C2A)
b8400000 b8404a80   Msfs     Msfs.SYS     Sun Apr 13 14:32:38 2008 (480251C6)
b8278000 b8280900   msgpc    msgpc.sys    Sun Apr 13 14:56:32 2008 (48025760)
b8580000 b8583c80   mssmbios mssmbios.sys Sun Apr 13 14:36:45 2008 (480252BD)
b7dee000 b7e07b80   Mup      Mup.sys      Sun Apr 13 15:17:05 2008 (48025C31)
b7e08000 b7e34980   NDIS     NDIS.sys     Sun Apr 13 15:20:35 2008 (48025D03)
b8560000 b8562780   ndistapi ndistapi.sys Sun Apr 13 14:57:27 2008 (48025797)
b1b83000 b1b86900   ndisuio  ndisuio.sys  Sun Apr 13 14:55:57 2008 (4802573D)
b7372000 b7388580   ndiswan  ndiswan.sys  Sun Apr 13 15:20:41 2008 (48025D09)
b82a8000 b82b1e80   NDProxy  NDProxy.SYS  Sun Apr 13 14:57:28 2008 (48025798)
b82e8000 b82f0780   netbios  netbios.sys  Sun Apr 13 14:56:01 2008 (48025741)
b27bb000 b27e2c00   netbt    netbt.sys    Sun Apr 13 15:20:59 2008 (48025D1B)
b8408000 b840f880   Npfs     Npfs.SYS     Sun Apr 13 14:32:38 2008 (480251C6)
804d7000 806e4000   nt       ntkrpamp.exe Sun Apr 13 14:31:06 2008 (4802516A)
b7e35000 b7ec1600   Ntfs     Ntfs.sys     Sun Apr 13 15:15:49 2008 (48025BE5)
b8706000 b8706b80   Null     Null.SYS     Fri Aug 17 16:47:39 2001 (3B7D82EB)
bd012000 bd62bf80   nv4_disp nv4_disp.dll Fri Jan 07 20:45:10 2011 (4D27C1A6)
b7420000 b7d8e3a0   nv4_mini nv4_mini.sys Fri Jan 07 20:47:36 2011 (4D27C238)
b73b1000 b73c4900   parport  parport.sys  Sun Apr 13 14:40:09 2008 (48025389)
b8330000 b8334d00   PartMgr  PartMgr.sys  Sun Apr 13 14:40:48 2008 (480253B0)
b85ea000 b85eba80   ParVdm   ParVdm.SYS   Fri Aug 17 16:49:49 2001 (3B7D836D)
b7f68000 b7f78a80   pci      pci.sys      Sun Apr 13 14:36:43 2008 (480252BB)
b8670000 b8670d00   pciide   pciide.sys   Fri Aug 17 16:51:49 2001 (3B7D83E5)
b8328000 b832e180   PCIIDEX  PCIIDEX.SYS  Sun Apr 13 14:40:29 2008 (4802539D)
b4a27000 b4a4aa80   portcls  portcls.sys  Sun Apr 13 15:19:40 2008 (48025CCC)
b81d8000 b81e0c00   processr processr.sys Sun Apr 13 14:31:29 2008 (48025181)
b7361000 b7371e00   psched   psched.sys   Sun Apr 13 14:56:36 2008 (48025764)
b83d8000 b83dc580   ptilink  ptilink.sys  Fri Aug 17 16:49:53 2001 (3B7D8371)
b80f8000 b8101200   PxHelp20 PxHelp20.sys Wed Mar 12 21:57:44 2008 (47D88A18)
b7329000 b732b280   rasacd   rasacd.sys   Fri Aug 17 16:55:39 2001 (3B7D84CB)
b8248000 b8254880   rasl2tp  rasl2tp.sys  Sun Apr 13 15:19:43 2008 (48025CCF)
b8258000 b8262200   raspppoe raspppoe.sys Sun Apr 13 14:57:31 2008 (4802579B)
b8268000 b8273d00   raspptp  raspptp.sys  Sun Apr 13 15:19:47 2008 (48025CD3)
b83e0000 b83e4080   raspti   raspti.sys   Fri Aug 17 16:55:32 2001 (3B7D84C4)
b2748000 b2772e80   rdbss    rdbss.sys    Sun Apr 13 15:28:38 2008 (48025EE6)
b85c6000 b85c7080   RDPCDD   RDPCDD.sys   Fri Aug 17 16:46:56 2001 (3B7D82C0)
b7331000 b7360e80   rdpdr    rdpdr.sys    Sun Apr 13 14:32:50 2008 (480251D2)
b8218000 b8226100   redbook  redbook.sys  Sun Apr 13 14:40:27 2008 (4802539B)
b4a4b000 b5093000   RtkHDAud RtkHDAud.sys Tue Jan 25 05:25:41 2011 (4D3EA525)
b855c000 b855fd80   serenum  serenum.sys  Sun Apr 13 14:40:12 2008 (4802538C)
b8228000 b8237c00   serial   serial.sys   Sun Apr 13 15:15:44 2008 (48025BE0)
b7ed9000 b7eeaf00   sr       sr.sys       Sun Apr 13 14:36:50 2008 (480252C2)
b17a4000 b17f5c00   srv      srv.sys      Sun Apr 13 15:15:08 2008 (48025BBC)
b85b8000 b85b9100   swenum   swenum.sys   Sun Apr 13 14:39:52 2008 (48025378)
b16a8000 b16b6d80   sysaudio sysaudio.sys Sun Apr 13 15:15:55 2008 (48025BEB)
b27e3000 b283b380   tcpip    tcpip.sys    Sun Apr 13 15:20:12 2008 (48025CEC)
b83d0000 b83d4a80   TDI      TDI.SYS      Sun Apr 13 15:00:04 2008 (48025834)
b8288000 b8291f00   termdd   termdd.sys   Sun Apr 13 14:38:36 2008 (4802532C)
b720b000 b7268f00   update   update.sys   Sun Apr 13 14:39:46 2008 (48025372)
b85be000 b85bf280   USBD     USBD.SYS     Fri Aug 17 17:02:58 2001 (3B7D8682)
b83b0000 b83b7600   usbehci  usbehci.sys  Sun Apr 13 14:45:34 2008 (480254CE)
b82b8000 b82c6880   usbhub   usbhub.sys   Sun Apr 13 14:45:36 2008 (480254D0)
b73c5000 b73e8200   USBPORT  USBPORT.SYS  Sun Apr 13 14:45:34 2008 (480254CE)
b83a8000 b83ad080   usbuhci  usbuhci.sys  Sun Apr 13 14:45:34 2008 (480254CE)
b83f8000 b83fd200   vga      vga.sys      Sun Apr 13 14:44:40 2008 (48025498)
b85ac000 b85ad500   viaide   viaide.sys   Sun Apr 13 14:40:30 2008 (4802539E)
b740c000 b741ff00   VIDEOPRT VIDEOPRT.SYS Sun Apr 13 14:44:39 2008 (48025497)
b80c8000 b80d4c80   VolSnap  VolSnap.sys  Sun Apr 13 14:41:00 2008 (480253BC)
b82d8000 b82e0700   wanarp   wanarp.sys   Sun Apr 13 14:57:20 2008 (48025790)
b8418000 b841c500   watchdog watchdog.sys Sun Apr 13 14:44:59 2008 (480254AB)
b155b000 b156f480   wdmaud   wdmaud.sys   Sun Apr 13 15:17:18 2008 (48025C3E)
bf800000 bf9c2980   win32k   win32k.sys   Sun Apr 13 15:29:46 2008 (48025F2A)
b85aa000 b85ab100   WMILIB   WMILIB.SYS   Fri Aug 17 17:07:23 2001 (3B7D878B)

Unloaded modules:
b150d000 b1538000   kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
b871a000 b871b000   drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00001000
b1688000 b1695000   DMusic.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
b1698000 b16a6000   swmidi.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
b1538000 b155b000   aec.sys 
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00023000
b85b6000 b85b8000   splitter.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
b83f0000 b83f5000   Cdaudio.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00005000
b732d000 b7330000   Sfloppy.SYS
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
 
Ok,so what can I do?
Buy anothers RAM's?
I will test the ram of a friend to see if that works.
 
It could be faulty ram or actually faulty motherboard slot. You should try your friend's RAM in different slots. You'll need to set the new stick in the bios correctly.

Mind that you also have stop 0x116, this comes from your videocard.
 
Back
Top Bottom