BSOD installing starcraft 2

Joined
Apr 19, 2011
Messages
7
Reaction score
0
Hello and thanks for the nice work you're doing for everyone here

I was getting some BSODs after I installed windows 7 ultimate 64bit and the drivers of my x58 extreme mobo
on my machine, the easiest way to get a BSOD is when I install Starcraft 2. my machine crashes in the middle of installation

here are the minidumps attached
the two BSODs from day 17 happened when copying back my backup files from a My Passport HD USB
the one from day 18 happened randomly. I think it was due to AVG, so I removed it and installed MSE
the ones from day 19 happened while installing Starcraft 2. I tried three times and got three crashed

I think it is a driver issue, since when I tried driver verifier, my machine crashed on the start of the boot and I had to use a restore point to be able to log again

thanks again!
 

Attachments

Joined
Apr 19, 2011
Messages
7
Reaction score
0
updated drivers and sc2 was installed, but..

now I updated the intel drivers and SC2 was installed ok, but the computer crashed when I was playing Fallout III

actually, I played for 5 minutes and minimized the game to check e-mail
browsing mail for more 5 minutes and.. BSOD
 

Attachments

Last edited:
Joined
Sep 22, 2010
Messages
613
Reaction score
102
RAM is the problem.


Attach additional information:

- snips of CPU-Z memory and CPU tabs
- Passmark RAMMon HTML.zip




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-32515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Tue Apr 19 00:00:23.275 2011 (UTC - 4:00)
System Uptime: 0 days 0:18:24.416
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 6efa, 2, 8779}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000006efa, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000008779, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000310238c to fffff80003072740

STACK_TEXT:  
fffff880`091ad218 fffff800`0310238c : 00000000`0000004e 00000000`00000099 00000000`00006efa 00000000`00000002 : nt!KeBugCheckEx
fffff880`091ad220 fffff800`030cf4d2 : 00000000`00000002 00000000`00000000 fffffa80`005ee8d0 00000000`00000080 : nt!MiBadShareCount+0x4c
fffff880`091ad260 fffff800`031332ad : fffffa80`005ee8d0 fffff880`091ad3c0 00000000`00000080 00000000`0018522c : nt! ?? ::FNODOBFM::`string'+0x11aa2
fffff880`091ad2c0 fffff800`0301f3a4 : fffff680`000cf038 fffff880`091ad3c0 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`091ad340 fffff800`0307082e : 00000000`00000001 00000000`00000000 00000000`04735001 00000000`19c9509c : nt! ?? ::FNODOBFM::`string'+0x43485
fffff880`091ad4a0 00000000`00507d2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018f9ac 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x507d2a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0310238c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-32093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`0325ce50
Debug session time: Tue Apr 19 00:06:10.373 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:04.513
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 130634, 0, 1305b4}

Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000130634, page frame number
Arg3: 0000000000000000, current page state
Arg4: 00000000001305b4, 0

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000311f38c to fffff8000308f740

STACK_TEXT:  
fffff880`03546298 fffff800`0311f38c : 00000000`0000004e 00000000`00000099 00000000`00130634 00000000`00000000 : nt!KeBugCheckEx
fffff880`035462a0 fffff800`030343d7 : 00000000`00130634 00000000`0001ff83 fffffa80`005fe890 00000580`00000000 : nt!MiBadShareCount+0x4c
fffff880`035462e0 fffff800`03074b82 : 00000000`00000000 fffffa80`0a809a00 00000000`00000702 fffff8a0`02f5e800 : nt! ?? ::FNODOBFM::`string'+0x2d244
fffff880`035463d0 fffff880`014b1e51 : fffffa80`09b8ca48 fffffa80`0a809a60 00000000`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`03546440 fffff880`014e806b : fffffa80`0a809a60 fffff8a0`02f5e8e0 00000000`00000000 fffff8a0`02f5e801 : Ntfs!NtfsFlushAndPurgeScb+0x1bb
fffff880`035464d0 fffff880`014d5e45 : fffffa80`0a809a60 fffffa80`06bb9dd8 fffffa80`092fe180 fffff8a0`02f5eb48 : Ntfs!NtfsOpenAttribute+0x81b
fffff880`035465e0 fffff880`014d278b : fffff880`08445470 fffffa80`0a809a60 fffff8a0`02f5eb48 fffff8a0`0000005c : Ntfs!NtfsOpenExistingAttr+0x145
fffff880`035466a0 fffff880`014d2eff : fffffa80`0a809a60 fffffa80`06bb9a80 fffff8a0`02f5eb48 fffff880`0000005c : Ntfs!NtfsOpenAttributeInExistingFile+0x5ab
fffff880`03546830 fffff880`014e3e76 : fffffa80`0a809a60 fffffa80`06bb9a80 fffff8a0`02f5eb48 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`03546920 fffff880`014de28d : fffffa80`0a809a60 fffffa80`06bb9a80 fffff880`03546b00 fffff880`03546b48 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`035469f0 fffff880`014394dd : fffffa80`0a809a60 fffffa80`06bb9a80 fffff880`08445470 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`03546bd0 fffff800`0309c961 : fffffa80`06a45500 fffff800`03083300 fffff800`03296100 60646064`00000000 : Ntfs!NtfsFspDispatch+0x26d
fffff880`03546cb0 fffff800`033327c6 : d1e1d1e1`59ac59ac fffffa80`06a41040 00000000`00000080 fffffa80`06a24b30 : nt!ExpWorkerThread+0x111
fffff880`03546d40 fffff800`0306dc26 : fffff880`03386180 fffffa80`06a41040 fffff880`033910c0 8d5b8d5b`f16cf16c : nt!PspSystemThreadStartup+0x5a
fffff880`03546d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiBadShareCount+4c
fffff800`0311f38c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-26406-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`0329ce50
Debug session time: Tue Apr 19 01:01:53.156 2011 (UTC - 4:00)
System Uptime: 0 days 0:20:04.312
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa8006995a60, c636f8b77f8e3d2d, c31ab2a17a4e00f1}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

Followup: Pool_corruption
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8006995a60, the pool entry being checked.
Arg3: c636f8b77f8e3d2d, the read back flink freelist value (should be the same as 2).
Arg4: c31ab2a17a4e00f1, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  Installer.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80003202d6f to fffff800030cf740

STACK_TEXT:  
fffff880`089a5038 fffff800`03202d6f : 00000000`00000019 00000000`00000003 fffffa80`06995a60 c636f8b7`7f8e3d2d : nt!KeBugCheckEx
fffff880`089a5040 fffff800`030f7a24 : 00000000`00000000 fffffa80`07ce0ec0 fffff980`00000000 fffffa80`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`089a5130 fffff800`030f8f44 : 00000000`000002fd 00000000`00000040 fffff6fc`c0033c00 fffff880`089a5230 : nt!MiAddViewsForSection+0x1d4
fffff880`089a51c0 fffff800`030f8407 : fffff8a0`0a13a960 fffff880`03115830 fffff880`089a5368 00000000`00000000 : nt!MmMapViewInSystemCache+0x194
fffff880`089a5330 fffff800`030ee2a0 : 00000000`00000000 fffffa80`0760c840 00000000`00001000 00000000`00000001 : nt!CcGetVacbMiss+0x177
fffff880`089a53f0 fffff800`030f2a32 : 00000000`00000000 00000000`00000000 fffff880`089a54d0 fffff880`089a5540 : nt!CcGetVirtualAddress+0x1b0
fffff880`089a5480 fffff800`033c1279 : fffff8a0`0230df00 fffff880`089a55a0 fffff8a0`00001000 fffff880`089a5600 : nt!CcPinFileData+0xb2
fffff880`089a5540 fffff880`0131a0bc : fffffa80`0a9ae970 00000000`00001000 fffff880`089a57c0 fffff8a0`0230df01 : nt!CcPreparePinWrite+0xc9
fffff880`089a5600 fffff880`013191f4 : fffff8a0`0a3e46f0 fffff8a0`0a3e48b8 00000000`00000000 fffff880`089a5601 : Ntfs!NtfsPreparePinWriteStream+0x5c
fffff880`089a5650 fffff880`012e040b : fffffa80`0761f340 fffff8a0`0a3e46f0 fffff8a0`0230df18 00000000`000007ff : Ntfs!GetIndexBuffer+0x2f0
fffff880`089a5740 fffff880`01313601 : fffffa80`07b6fa90 00000000`00000001 00000000`00000400 fffff880`089a59b8 : Ntfs!PushIndexRoot+0x25f
fffff880`089a5920 fffff880`0131536d : 00000000`00000000 fffff8a0`0a3e46f0 fffff880`089a5a18 fffff8a0`0230df18 : Ntfs!AddToIndex+0x181
fffff880`089a59a0 fffff880`01314fd5 : fffffa80`0761f340 00000000`00000000 fffff8a0`02725b40 fffffa80`0761f340 : Ntfs!NtfsAddIndexEntry+0x11d
fffff880`089a5ba0 fffff880`01312d1f : fffffa80`0761f340 fffff8a0`0a3e46f0 fffff8a0`02725b40 fffff8a0`0a3e46f0 : Ntfs!NtfsAddNameToParent+0x46c
fffff880`089a5ca0 fffff880`013107b2 : fffffa80`0761f340 fffff8a0`02725c70 fffffa80`07b99180 fffffa80`0761f340 : Ntfs!NtfsAddLink+0x1c7
fffff880`089a5dc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCreateNewFile+0x8d2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+a56
fffff800`03202d6f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExDeferredFreePool+a56

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+a56

Followup: Pool_corruption
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041911-21109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305c000 PsLoadedModuleList = 0xfffff800`03299e50
Debug session time: Tue Apr 19 22:57:25.964 2011 (UTC - 4:00)
System Uptime: 0 days 1:31:33.105
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {8884, fffffa8004b59f70, fffffa80001ae8f0, 502}

Probably caused by : memory_corruption ( nt!MiRelinkStandbyPage+c6 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa8004b59f70
Arg3: fffffa80001ae8f0
Arg4: 0000000000000502

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_8884

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff8000317ae56 to fffff800030cc740

STACK_TEXT:  
fffff880`072e78b8 fffff800`0317ae56 : 00000000`0000001a 00000000`00008884 fffffa80`04b59f70 fffffa80`001ae8f0 : nt!KeBugCheckEx
fffff880`072e78c0 fffff800`031d9685 : fffffa80`099a2f70 fffffa80`099c7000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`072e7930 fffff800`034dee44 : fffffa80`099a2000 fffff880`072e7ca0 fffff880`072e7a08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`072e7980 fffff800`0353fb7a : 00000000`00000020 00000000`00000000 fffffa80`099a2000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`072e79d0 fffff800`035442be : 00000000`00000000 00000000`01ccbb08 00000000`0000004f fffff880`00c1b601 : nt!PfSetSuperfetchInformation+0x199
fffff880`072e7ab0 fffff800`030cb993 : fffffa80`09730060 00000000`02e91230 00000000`0e273868 00000000`02e91e30 : nt!NtSetSystemInformation+0xb91
fffff880`072e7c20 00000000`77030daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01ccba48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77030daa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiRelinkStandbyPage+c6
fffff800`0317ae56 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiRelinkStandbyPage+c6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x1a_8884_nt!MiRelinkStandbyPage+c6

BUCKET_ID:  X64_0x1a_8884_nt!MiRelinkStandbyPage+c6

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`10b8d000 fffff880`10bcb000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f77000 fffff880`00fce000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04045000 fffff880`040cf000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`10bdb000 fffff880`10bf1000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00c4d000 fffff880`00c58000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0fe90000 fffff880`0fed8000   ap19f4od ap19f4od.SYS Sun Nov 28 05:38:44 2010 (4CF23134)
fffff880`07737000 fffff880`07742000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00c1a000 fffff880`00c23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c23000 fffff880`00c4d000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04141000 fffff880`04148000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042a1000 fffff880`042b2000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06b55000 fffff880`06b73000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`007c0000 fffff960`007e7000   cdd      cdd.dll      unavailable (00000000)
fffff880`040dd000 fffff880`04107000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eb7000 fffff880`00f77000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d11000 fffff880`00d6f000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01543000 fffff880`015b6000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`10bcb000 fffff880`10bdb000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`065ea000 fffff880`065f8000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04200000 fffff880`04283000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04283000 fffff880`042a1000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`043e5000 fffff880`043f4000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`015d1000 fffff880`015e7000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0607c000 fffff880`0609e000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`060b0000 fffff880`060b9000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`060a4000 fffff880`060b0000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`060b9000 fffff880`060cc000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`060cc000 fffff880`060d8000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`044f8000 fffff880`045ec000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`04400000 fffff880`04446000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`00ca4000 fffff880`00cb8000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c58000 fffff880`00ca4000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`015c7000 fffff880`015d1000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01486000 fffff880`014c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`017a1000 fffff880`017eb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`03013000 fffff800`0305c000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04446000 fffff880`0446a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06a8d000 fffff880`06b55000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016a5000 fffff880`016ae000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0fe57000 fffff880`0fe75000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`042d8000 fffff880`042ee000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`0612a000 fffff880`0614d000   irda     irda.sys     Mon Jul 13 20:09:01 2009 (4A5BCC9D)
fffff880`044ea000 fffff880`044f3000   irenum   irenum.sys   Mon Jul 13 20:08:59 2009 (4A5BCC9B)
fffff880`044de000 fffff880`044ea000   irsir    irsir.sys    Sat Jan 19 01:36:11 2008 (47919A5B)
fffff880`00dcb000 fffff880`00dec000   jraid    jraid.sys    Fri Oct 29 06:12:47 2010 (4CCA9E1F)
fffff880`045ec000 fffff880`045fb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb8000 fffff800`00bc2000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`04bb1000 fffff880`04bf4000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01529000 fffff880`01543000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0609e000 fffff880`060a3200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0614d000 fffff880`06162000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`060e6000 fffff880`06109000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cb9000 fffff880`00cfd000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`060d8000 fffff880`060e6000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0fe75000 fffff880`0fe84000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`00c00000 fffff880`00c1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`04107000 fffff880`04138000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`076a1000 fffff880`076b1000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`06b73000 fffff880`06b8b000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06b8b000 fffff880`06bb8000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`06a00000 fffff880`06a4e000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`06a4e000 fffff880`06a71000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`041a6000 fffff880`041b1000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0102f000 fffff880`01039000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`014cb000 fffff880`01529000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`043da000 fffff880`043e5000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01693000 fffff880`016a5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016af000 fffff880`017a1000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04b13000 fffff880`04b1f000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04b1f000 fffff880`04b4e000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04a6c000 fffff880`04a81000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04322000 fffff880`04331000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04000000 fffff880`04045000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`076b1000 fffff880`076c6000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`041b1000 fffff880`041c2000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`043ce000 fffff880`043da000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0305c000 fffff800`03639000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01242000 fffff880`013e5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`04138000 fffff880`04141000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10b8b000 fffff880`10b8c180   nvBridge nvBridge.kmd Thu Apr 07 23:14:49 2011 (4D9E7DA9)
fffff880`04a81000 fffff880`04aae000   nvhda64v nvhda64v.sys Thu Mar 03 10:59:02 2011 (4D6FBAC6)
fffff880`0fee6000 fffff880`10b8a300   nvlddmkm nvlddmkm.sys Thu Apr 07 23:22:12 2011 (4D9E7F64)
fffff880`042fc000 fffff880`04322000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fce000 fffff880`00fe3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01046000 fffff880`01079000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01079000 fffff880`01080000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`011ee000 fffff880`011fe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`015b6000 fffff880`015c7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06eed000 fffff880`06f93000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04aae000 fffff880`04aeb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cfd000 fffff880`00d11000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04aef000 fffff880`04b13000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04b4e000 fffff880`04b69000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04b69000 fffff880`04b8a000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04b8a000 fffff880`04ba4000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0437d000 fffff880`043ce000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`04ba4000 fffff880`04baf000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0418b000 fffff880`04194000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`04194000 fffff880`0419d000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0419d000 fffff880`041a6000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0144c000 fffff880`01486000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06162000 fffff880`0617a000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0fe00000 fffff880`0fe57000   Rt64win7 Rt64win7.sys Mon Sep 20 03:38:09 2010 (4C970F61)
fffff880`06407000 fffff880`065e9900   RTKVHD64 RTKVHD64.sys Tue Aug 18 05:29:10 2009 (4A8A7466)
fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06f93000 fffff880`06f9e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0fe84000 fffff880`0fe90000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04331000 fffff880`0434e000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0168b000 fffff880`01693000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01083000 fffff880`011e5000   sptd     sptd.sys     Tue Nov 23 06:47:37 2010 (4CEBA9D9)
fffff880`0760c000 fffff880`076a1000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`06e00000 fffff880`06e67000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`06f9e000 fffff880`06fcb000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`04baf000 fffff880`04bb0480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`06fcb000 fffff880`06fdd000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`041e0000 fffff880`041ed000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`041c2000 fffff880`041e0000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04369000 fffff880`0437d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`042b2000 fffff880`042d8000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`07742000 fffff880`07796000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`04a00000 fffff880`04a12000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`044cd000 fffff880`044de000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04a12000 fffff880`04a6c000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04477000 fffff880`044cd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`0446a000 fffff880`04477000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01039000 fffff880`01046000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`04148000 fffff880`04156000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`04156000 fffff880`0417b000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017eb000 fffff880`017fb000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fe3000 fffff880`00ff8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d6f000 fffff880`00dcb000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01400000 fffff880`0144c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0434e000 fffff880`04369000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0417b000 fffff880`0418b000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ea4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea4000 fffff880`00eb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`040cf000 fffff880`040d8000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00382000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`0fed8000 fffff880`0fee1000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`011e5000 fffff880`011ee000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06109000 fffff880`0612a000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`076c6000 fffff880`07737000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`015e7000 fffff880`015f5000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01230000 fffff880`0123c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`015f5000 fffff880`015fe000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`013e5000 fffff880`013f8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Apr 19, 2011
Messages
7
Reaction score
0
Hi! Thanks for your info and help. Let me share my last experiences:

I went to ASRock website and I noticed there were many issues about DRAM compatibility on its BIOS update page

I updated the BIOS and the system got more stable. I was able to install SC2, play Fallout III, open a lot of webpages on IE, etc.

The system remained stable and turned on by two days until I finally got another BSOD. The according dump is attached on this post.

Meanwhile, I will check CPU-Z and post the data in the next post.
I never used RAMMon. Is that the correct one? http://www.passmark.com/products/rammon.htm

thanks!
 

Attachments

Joined
Sep 22, 2010
Messages
613
Reaction score
102
This time you got:

BugCheck 1A, {8887, fffffa800213e8b0, fffffa800093e850, 102}
Probably caused by : hardware_ram ( ZEROED_PAGE_CORRUPTED )

Last time:

PFN_LIST
memory_corruption

All that means some memory (or could be even mobo) issue
4 identical sticks running at correct settings 1333 9-9-9-24 1.5v. Good.

---> How about cpu-z CPU tab ?

- Load bios defaults.
- Run 10 passes of www.memtest.org
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
The cpu is running slightly overstock.

1. Disable the turbo boost overclocking
2. Enable EIST

You can achieve this by loading bios defaults.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top