Windows 7 Periodic Blue screens -new laptop

rups21

New Member
Joined
Apr 11, 2011
hey guys

I have windows 7 home premium installed on my hp pavilion dv6 laptop

On first startup,blue screens appeared within 2 weeks
They kept on occuring every 4-5 days despite repeated image reinstall and system restore

Next i deleted the factory image and reinstalled the same version thru another CD

The problem persists with blue screens occuring every 15-20 days..system restore helps for the short term but no real cause known..

Am attaching the dump files generated from feb'11 to date

Windows memory diagnostic gives a pass after system restore(when things are running smoothly) ,but after a blue screen it says hardware error.

Thanks
 

Attachments

  • minidump_1.zip
    173.6 KB · Views: 237
0xF4_C0000005_IMAGE_csrss.exe
0xF4_C0000005_IMAGE_wininit.exe
0x6B_nt!Phase1InitializationDiscard
0x1a_41790_nt!_??_::FNODOBFM::_string
0x3B_nt!ObpCloseHandleTableEntry



Windows memory diagnostic gives a pass after system restore(when things are running smoothly) ,but after a blue screen it says hardware error.


1. Uninstall Intel Turbo Boost
Impcd.sys Mon Oct 12 22:00:51 2009


2. Update drivers:

Intel Matrix Storage
iaStor.sys Fri Aug 07 08:23:37 2009
Intel® Driver Update Utility

Elaborate Bytes AG Virtual Clone
ElbyCDIO.sys Tue Feb 17 12:11:23 2009

nVidia (if available at your notebook support)
nvlddmkm.sys Sat Nov 28 23:50:19 2009

Realtek LAB
Rt64win7.sys Fri Oct 23 05:53:38 2009
Realtek


Touchpad
SynTP.sys Sat Aug 15 01:26:53 2009



If the blue screens persist after steps 1-2,

3. Replace Avira with MSE
Link Removed due to 404 Error


4. http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html



CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041111-16645-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`0303de50
Debug session time: Mon Apr 11 06:31:45.172 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.358
Loading Kernel Symbols
..........................................................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 6B, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!Phase1InitializationDiscard+1331 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PROCESS1_INITIALIZATION_FAILED (6b)
Arguments:
Arg1: 0000000000000000, Indicates the NT status code that caused the failure.
Arg2: 0000000000000000, (reserved)
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x6B

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800033a2bc1 to fffff80002e71ed0

STACK_TEXT:  
fffff880`009a9b38 fffff800`033a2bc1 : 00000000`00000000 00000000`00000000 fffff800`00812a10 fffff800`00812a10 : nt!KeBugCheck
fffff880`009a9b40 fffff800`032f3419 : f343b59b`7b843db1 fffffa80`024bd040 00000000`00000080 fffffa80`024bc450 : nt!Phase1InitializationDiscard+0x1331
fffff880`009a9d10 fffff800`03115166 : af377cc1`fc18a2a3 00000000`00000080 270398de`95a0b2c1 fffff800`02e50479 : nt!Phase1Initialization+0x9
fffff880`009a9d40 fffff800`02e50486 : fffff800`02feae80 fffffa80`024bd040 fffff800`02ff8c40 dedae6ff`ff6ecfb9 : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!Phase1InitializationDiscard+1331
fffff800`033a2bc1 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!Phase1InitializationDiscard+1331

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x6B_nt!Phase1InitializationDiscard+1331

BUCKET_ID:  X64_0x6B_nt!Phase1InitializationDiscard+1331

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031211-14071-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Sat Mar 12 08:17:59.604 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:12.791
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa8000e4fba0, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8000e4fba0
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41790

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ee726e to fffff80002e74f00

STACK_TEXT:  
fffff880`04ca0828 fffff800`02ee726e : 00000000`0000001a 00000000`00041790 fffffa80`00e4fba0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`04ca0830 fffff800`02ea85d9 : 00000000`00000000 000007fe`fbc0bfff fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`04ca09f0 fffff800`0318ae50 : fffffa80`04dfa160 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`04ca0b10 fffff800`0318b25b : 00000000`00000000 000007fe`fbbe0000 fffffa80`00000001 fffffa80`05297df0 : nt!MiUnmapViewOfSection+0x1b0
fffff880`04ca0bd0 fffff800`02e74153 : fffffa80`04bee960 fffff880`04ca0ca0 fffffa80`05986b30 fffffa80`05257550 : nt!NtUnmapViewOfSection+0x5f
fffff880`04ca0c20 00000000`76e1015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020bb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e1015a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02ee726e cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+339d6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6

BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\031211-13088-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`03053e50
Debug session time: Sat Mar 12 08:13:42.577 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:40.763
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000319b10e, fffff8800643ee30, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+3e )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000319b10e, Address of the instruction which caused the bugcheck
Arg3: fffff8800643ee30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpCloseHandleTableEntry+3e
fffff800`0319b10e 410fb6442418    movzx   eax,byte ptr [r12+18h]

CONTEXT:  fffff8800643ee30 -- (.cxr 0xfffff8800643ee30)
rax=ffff0000058efef1 rbx=fffff80003038300 rcx=fffff8a0010ee1e0
rdx=fffff8a00140a7b0 rsi=fffffa8005bcf060 rdi=fffffa8005bcf060
rip=fffff8000319b10e rsp=fffff8800643f810 rbp=fffff8a0010ee1e0
 r8=fffffa800592d5e0  r9=00000000000001ec r10=00000000000001ec
r11=fffff8800643f870 r12=ffff0000058efef0 r13=0000000000000000
r14=fffffa800592d700 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCloseHandleTableEntry+0x3e:
fffff800`0319b10e 410fb6442418    movzx   eax,byte ptr [r12+18h] ds:002b:ffff0000`058eff08=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  IAANTmon.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8000319b10e

STACK_TEXT:  
fffff880`0643f810 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandleTableEntry+0x3e


FOLLOWUP_IP: 
nt!ObpCloseHandleTableEntry+3e
fffff800`0319b10e 410fb6442418    movzx   eax,byte ptr [r12+18h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCloseHandleTableEntry+3e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

STACK_COMMAND:  .cxr 0xfffff8800643ee30 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+3e

BUCKET_ID:  X64_0x3B_nt!ObpCloseHandleTableEntry+3e

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041111-15834-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03090e50
Debug session time: Mon Apr 11 06:44:04.606 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:01.183
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F4, {3, fffffa80045e4600, fffffa80045e48e0, fffff800031cd240}

Probably caused by : wininit.exe

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa80045e4600, Terminating object
Arg3: fffffa80045e48e0, Process image file name
Arg4: fffff800031cd240, Explanatory message (ascii)

Debugging Details:
------------------


PROCESS_OBJECT: fffffa80045e4600

IMAGE_NAME:  wininit.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: wininit

FAULTING_MODULE: 0000000000000000 

PROCESS_NAME:  wininit.exe

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0xF4_C0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  0

STACK_TEXT:  
fffff880`02ab8b58 fffff800`03250142 : 00000000`000000f4 00000000`00000003 fffffa80`045e4600 fffffa80`045e48e0 : nt!KeBugCheckEx
fffff880`02ab8b60 fffff800`031fc269 : ffffffff`ffffffff fffffa80`05ee0640 fffffa80`045e4600 fffffa80`045e4600 : nt!PspCatchCriticalBreak+0x92
fffff880`02ab8ba0 fffff800`03180c74 : ffffffff`ffffffff 00000000`00000001 fffffa80`045e4600 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17a06
fffff880`02ab8bf0 fffff800`02ec4153 : fffffa80`045e4600 fffff880`c0000005 fffffa80`05ee0640 00000000`00000000 : nt!NtTerminateProcess+0xf4
fffff880`02ab8c70 fffff800`02ec06f0 : fffff800`02f04ada fffff880`02ab9a00 fffff880`02ab9340 fffff880`02ab9c20 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02ab8e08 fffff800`02f04ada : fffff880`02ab9a00 fffff880`02ab9340 fffff880`02ab9c20 00000000`00000002 : nt!KiServiceLinkage
fffff880`02ab8e10 fffff800`02fc73d9 : fffff880`02ab9a00 fffff880`02ab9a00 fffff880`02ab9c20 fffff880`02ab94e0 : nt! ?? ::FNODOBFM::`string'+0x4619d
fffff880`02ab94b0 fffff800`02ec6bfb : fffff880`02ab9a00 fffffa80`05ee0640 00000000`00000000 fffff880`02ab9bc0 : nt!KiRaiseException+0x1b9
fffff880`02ab9ae0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtRaiseException+0x7b


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  X64_0xF4_C0000005_IMAGE_wininit.exe

BUCKET_ID:  X64_0xF4_C0000005_IMAGE_wininit.exe

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041111-15085-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e01000 PsLoadedModuleList = 0xfffff800`0303ee50
Debug session time: Mon Apr 11 07:02:42.007 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:51.194
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F4, {3, fffffa8004969730, fffffa8004969a10, fffff8000317b240}

Probably caused by : csrss.exe

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa8004969730, Terminating object
Arg3: fffffa8004969a10, Process image file name
Arg4: fffff8000317b240, Explanatory message (ascii)

Debugging Details:
------------------


PROCESS_OBJECT: fffffa8004969730

IMAGE_NAME:  csrss.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: csrss

FAULTING_MODULE: 0000000000000000 

PROCESS_NAME:  csrss.exe

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0xF4_C0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  0

STACK_TEXT:  
fffff880`02b7fb08 fffff800`031fe142 : 00000000`000000f4 00000000`00000003 fffffa80`04969730 fffffa80`04969a10 : nt!KeBugCheckEx
fffff880`02b7fb10 fffff800`031aa269 : ffffffff`ffffffff fffffa80`04c58b60 fffffa80`04969730 fffffa80`04969730 : nt!PspCatchCriticalBreak+0x92
fffff880`02b7fb50 fffff800`0312ec74 : ffffffff`ffffffff 00000000`00000001 fffffa80`04969730 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17a06
fffff880`02b7fba0 fffff800`02e72153 : fffffa80`04969730 fffff880`c0000005 fffffa80`04c58b60 fffffa80`052a8b60 : nt!NtTerminateProcess+0xf4
fffff880`02b7fc20 00000000`774a017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0144e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774a017a


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  X64_0xF4_C0000005_IMAGE_csrss.exe

BUCKET_ID:  X64_0xF4_C0000005_IMAGE_csrss.exe

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`04212000 fffff880`04250000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`0431f000 fffff880`0432c000   Accelerometer Accelerometer.sys Fri Jul 16 11:02:38 2010 (4C40748E)
fffff880`00eef000 fffff880`00f46000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`0404c000 fffff880`040d6000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0435b000 fffff880`04371000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`011cf000 fffff880`011da000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`08b07000 fffff880`08b12000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`01181000 fffff880`0118a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0118a000 fffff880`011b4000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02984000 fffff880`029a1000   avgntflt avgntflt.sys Thu Nov 11 10:59:48 2010 (4CDC12F4)
fffff880`00e11000 fffff880`00e33000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
fffff880`00fb7000 fffff880`00fc3000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`03e33000 fffff880`03e3a000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`00e00000 fffff880`00e11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03b5d000 fffff880`03b7b000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`029ee000 fffff880`029fe000   BthEnum  BthEnum.sys  Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`02800000 fffff880`02820000   bthpan   bthpan.sys   Mon Jul 13 20:07:00 2009 (4A5BCC24)
fffff880`028d5000 fffff880`02961000   bthport  bthport.sys  Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0569c000 fffff880`056b4000   BTHUSB   BTHUSB.sys   Mon Jul 13 20:06:52 2009 (4A5BCC1C)
fffff880`04200000 fffff880`04211000   btusbflt btusbflt.sys Thu Apr 08 21:11:36 2010 (4BBE7EC8)
fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`03e00000 fffff880`03e2a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cd8000 fffff880`00d98000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013cd000 fffff880`013fd000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c7a000 fffff880`00cd8000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02c61000 fffff880`02c65500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
fffff880`01508000 fffff880`0157b000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fae000 fffff880`00fb7000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`0434b000 fffff880`0435b000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0485c000 fffff880`0486a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`011da000 fffff880`011f8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04033000 fffff880`04042000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01474000 fffff880`0148a000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`049b4000 fffff880`049d6000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`0486a000 fffff880`0487d000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03eb4000 fffff880`03fd0000   dump_iaStor dump_iaStor.sys Fri Aug 07 08:23:37 2009 (4A7C1CC9)
fffff880`0487d000 fffff880`04889000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`02c66000 fffff880`02d5a000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`05600000 fffff880`05646000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`04029000 fffff880`04033000   ElbyCDIO ElbyCDIO.sys Tue Feb 17 12:11:23 2009 (499AEFBB)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0158c000 fffff880`01596000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0143a000 fffff880`01474000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033de000 fffff800`03427000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`05646000 fffff880`0566a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04800000 fffff880`0485c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`017f0000 fffff880`017fa000   hpdskflt hpdskflt.sys Fri Jul 16 11:02:38 2010 (4C40748E)
fffff880`03a95000 fffff880`03b5d000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`017e7000 fffff880`017f0000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04270000 fffff880`0428e000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01065000 fffff880`01181000   iaStor   iaStor.sys   Fri Aug 07 08:23:37 2009 (4A7C1CC9)
fffff880`042fa000 fffff880`0431ee00   Impcd    Impcd.sys    Mon Oct 12 22:00:51 2009 (4AD3DF53)
fffff880`04335000 fffff880`0434b000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03bbf000 fffff880`03bee000   ipnat    ipnat.sys    Mon Jul 13 20:10:03 2009 (4A5BCCDB)
fffff880`0400b000 fffff880`04029000   ISODrv64 ISODrv64.sys Thu Jan 28 22:39:02 2010 (4B625856)
fffff880`0428e000 fffff880`0429d000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bc0000 fffff800`00bca000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`0489b000 fffff880`048de000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`014ee000 fffff880`01508000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`049d6000 fffff880`049db200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`02820000 fffff880`02835000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02961000 fffff880`02984000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c22000 fffff880`00c66000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`04889000 fffff880`04897000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`042eb000 fffff880`042fa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00fd8000 fffff880`00ff2000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b7b000 fffff880`03b93000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03b93000 fffff880`03bbf000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`03a00000 fffff880`03a4d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`03a4d000 fffff880`03a70000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`011b4000 fffff880`011bf000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e98000 fffff880`03ea3000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f4f000 fffff880`00f59000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01490000 fffff880`014ee000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04000000 fffff880`0400b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017d5000 fffff880`017e7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016db000 fffff880`017cd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04395000 fffff880`043a1000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`02888000 fffff880`0289b000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`043a1000 fffff880`043d0000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0494a000 fffff880`0495f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04160000 fffff880`0416f000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040d6000 fffff880`0411b000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`03ea3000 fffff880`03eb4000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041ef000 fffff880`041fb000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e01000 fffff800`033de000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0122a000 fffff880`013cd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`03e2a000 fffff880`03e33000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`061d9000 fffff880`061da180   nvBridge nvBridge.kmd Sat Nov 28 23:21:05 2009 (4B11F6B1)
fffff880`0495f000 fffff880`04977000   nvhda64v nvhda64v.sys Fri Aug 21 16:23:50 2009 (4A8F0256)
fffff880`056b5000 fffff880`061d8700   nvlddmkm nvlddmkm.sys Sat Nov 28 23:50:19 2009 (4B11FD8B)
fffff880`02835000 fffff880`02888000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`04124000 fffff880`0414a000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f99000 fffff880`00fae000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f59000 fffff880`00f8c000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011bf000 fffff880`011cf000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0157b000 fffff880`0158c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`04c01000 fffff880`04ca7000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04977000 fffff880`049b4000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c66000 fffff880`00c7a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04371000 fffff880`04395000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`043d0000 fffff880`043eb000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0567b000 fffff880`0569c000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`061db000 fffff880`061f5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0419e000 fffff880`041ef000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03e7d000 fffff880`03e86000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03e86000 fffff880`03e8f000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03e8f000 fffff880`03e98000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`029c2000 fffff880`029ee000   rfcomm   rfcomm.sys   Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0289b000 fffff880`028b3000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`08b12000 fffff880`08b5d000   Rt64win7 Rt64win7.sys Fri Oct 23 05:53:38 2009 (4AE17D22)
fffff880`02c00000 fffff880`02c2f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`04250000 fffff880`04270000   sdbus    sdbus.sys    Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`04ca7000 fffff880`04cb2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017cd000 fffff880`017d5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08a96000 fffff880`08b07000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`04d5a000 fffff880`04df2000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`04cf1000 fffff880`04d5a000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`04cb2000 fffff880`04cdf000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`043fa000 fffff880`043fb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0429d000 fffff880`042e9000   SynTP    SynTP.sys    Sat Aug 15 01:26:53 2009 (4A86471D)
fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`04cdf000 fffff880`04cf1000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`03fe4000 fffff880`03ff1000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01200000 fffff880`0121e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0418a000 fffff880`0419e000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00410000 fffff960`0041a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`02c3b000 fffff880`02c61000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`048de000 fffff880`048f0000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`049dc000 fffff880`049f9000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`042e9000 fffff880`042eaf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0566a000 fffff880`0567b000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`048f0000 fffff880`0494a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`02d5a000 fffff880`02db0000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`02db0000 fffff880`02ddd200   usbvideo usbvideo.sys Wed Mar 03 23:40:57 2010 (4B8F39D9)
fffff880`043eb000 fffff880`043fa000   VClone   VClone.sys   Fri May 22 19:08:37 2009 (4A173075)
fffff880`00f8c000 fffff880`00f99000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`03e3a000 fffff880`03e48000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`03e48000 fffff880`03e6d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fc3000 fffff880`00fd8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d98000 fffff880`00df4000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01596000 fffff880`015e2000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0414a000 fffff880`04160000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`0416f000 fffff880`0418a000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`03e6d000 fffff880`03e7d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e3c000 fffff880`00ee0000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ee0000 fffff880`00eef000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0411b000 fffff880`04124000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`0432c000 fffff880`04335000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f46000 fffff880`00f4f000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`029a1000 fffff880`029c2000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`02db0000 fffff880`02dfb000   Rt64win7.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0004B000
fffff880`015e2000 fffff880`015f0000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`03eb5000 fffff880`03fd1000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0011C000
fffff880`03fd1000 fffff880`03fe4000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Thanks for the prompt reply.

Attached are the CPU-Z and Rammon info
 

Attachments

  • spd2.PNG
    spd2.PNG
    43.9 KB · Views: 426
  • memory.PNG
    memory.PNG
    27.7 KB · Views: 387
  • spd1.PNG
    spd1.PNG
    42.8 KB · Views: 430
  • rammon.txt
    9.7 KB · Views: 583
Yes, RAM is the problem:

1Gb Hynix and 2Gb Samsung,

both rated 1333Mhz 9-9-9-24 1.5v.

So that's what you need to set them (your current vlues are 1066Mhz 7 7 7 20, wrong).


~~~~~~~~


There is a good chance your PC will crash again, because the rates are not the same for each stick:



# of Row Addressing Bits 13 | 14

Device Width in Bits 16 | 8

Minimum Row Active to Row Active Delay, tRRD (ns) 7.500 | 6.000

Minimum Four Activate Window Delay, tFAW (ns) 45.000 | 30.000

Auto-self Refresh Supported Yes | No

Reference Raw Card Used Raw Card A Rev. 0 | Raw Card F Rev. 2




What to do?

1. In the bios, set DRAM 1333Mhz 9-9-9-24 1.5v

2. If blue screens again, remove the Hynix 1 Gb stick
 
hey

Thanks a lot for pointing out the settings anomaly

It seems the bios (insyde h20) doesnt have "advanced settings" option to make the changes.
Is there any other way to go about this ?

Thanks again
 
Uninstall Intel Turbo Boost for now (as it may be affecting), then in the bios load setup/optimized/fail-safe defaults.
 
hey
The blue screens and crashes did increase the last 2 days

I have been getting "instruction at 0x777.. referenced memory 0x779..The memory could not be written" errors.Also "memory could not be read" errors have pooped up while performing system restore as well as during normal operation.

"Windows has encountered critical conditions and needs to restart " is also among the messages

I have removed intel turbo boost but the problem still persists.

Also i didnt find the setup/optimized/fail safe defaults option in the bios.


Thanks
 
Remove the Hynix 1 Gb stick.

Yes, RAM is the problem:

1Gb Hynix and 2Gb Samsung,

both rated 1333Mhz 9-9-9-24 1.5v.

So that's what you need to set them (your current vlues are 1066Mhz 7 7 7 20, wrong).


~~~~~~~~


There is a good chance your PC will crash again, because the rates are not the same for each stick:



# of Row Addressing Bits 13 | 14

Device Width in Bits 16 | 8

Minimum Row Active to Row Active Delay, tRRD (ns) 7.500 | 6.000

Minimum Four Activate Window Delay, tFAW (ns) 45.000 | 30.000

Auto-self Refresh Supported Yes | No

Reference Raw Card Used Raw Card A Rev. 0 | Raw Card F Rev. 2




What to do?

1. In the bios, set DRAM 1333Mhz 9-9-9-24 1.5v

2. If blue screens again, remove the Hynix 1 Gb stick
 
Hi TS, i also do have the HP pavillion dv6 laptop as shown in here(Link Removed - Invalid URL). The only way my computer is different from yours is that mine was bundled with an additional 4gb of ddr3 ram, making the toal 8gp of ram.

I have been getting frequent blue screens too, which i suspect is the same problem as yours. I wonder whether this could be a manufacturing defect. Anyone care to help both of us? Thanks and much appreciated.
 
Back
Top Bottom