Windows 7 Forum: konfiguracja, optymalizacja, porady, gadżety •

Pełna wersja: BSOD: częste błędy w laptopie Lenovo B570
Aktualnie przeglądasz uproszczoną wersję forum. Kliknij tutaj, by zobaczyć wersję z pełnym formatowaniem.
Witam, mam problem z laptopem Lenovo B570. Mianowicie często pojawia się BlueScreen i komputer restartuje się, pojawiąją się różne kody, teraz akurat pojawił się taki:

Podpis problemu:
Nazwa zdarzenia problemu: BlueScreen
Wersja systemu operacyjnego: 6.1.7600.2.0.0.256.48
Identyfikator ustawień regionalnych: 1045

Dodatkowe informacje o problemie:
BCCode: 50
BCP1: FFFFF88004AD27D0
BCP2: 0000000000000000
BCP3: FFFFF96000302D80
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1

Pliki pomagające opisać problem:
C:\Windows\Minidump\092912-20545-01.dmp
C:\Users\Adrian\AppData\Local\Temp\WER-50700-0.sysdata.xml

Przeczytaj w trybie online nasze zasady zachowania poufności informacji:
http://go.microsoft.com/fwlink/?linkid=1...cid=0x0415

Jeśli zasady zachowania poufności informacji w trybie online nie są dostępne, przeczytaj nasze zasady zachowania poufności informacji w trybie offline:
C:\Windows\system32\pl-PL\erofflps.txt


System był wgrywany już kilkanaście razy od nowa, próbował różne werse Wind 7 i nic, zainstalował nawet Viste i było dobrze 3 dni. Komputer był na gwarancji ale nie wykryto uszkodzenia.

Konfiguracja:
Intel Core i3
Ram 8 GB
Grafika Intel HD 3000

Dodaje pliki mimidump i system:
http://www29.zippyshare.com/v/39038653/file.html
Pytanie nr 1 - czy jest legalny system a jeśli jest to dlaczego przeskakujesz między różnymi wersjami licencji skoro ich prawdopodobnie nie posiadasz.
W zasadzie plik dziennika zdarzeń w miarę OK. Poważniejsze błędy przy aktualizacji poprawek:
Instalacja nie powiodła się: system Windows nie mógł zainstalować następującej aktualizacji, ponieważ wystąpił błąd 0x80070643: Zbiorcza aktualizacja zabezpieczeń programu Internet Explorer 8 dla systemu Windows 7 x64 (KB2744842).
http://support.microsoft.com/kb/976982

Moim zdaniem wszystkie bsody sprowadzają się do wadliwych kości RAM/problemów z portami pamięci na płycie choć memtest86 nie zawsze jest wiarygodny.

To co co bym zrobił
- postawił system z recovery lub zainstalował tą na którą masz licencję;
- jeśli goły system to doinstalować aktualne sterowniki ze tylko ze strony producenta;
- jeśli fabryczny system to odchudzanie nadmiaru bloatware programem PC Decrapifier;
- zainstalować wszelkie poprawki razem z SP1 (widziałem system był bez);
- zainstalować Program AV/IS;
- zrobić kopię zapasową systemu na drugą partycję żeby po tysiąc razy nie przeinstalowywać w razie czego;
- zainstalować jakąś jedną grę i zacząć korzystać normalnie z systemu czyli internet filmy, muzyka i obserwować;
- dla pewności przeprowadzić inspekcję sterowników
Cytat:Dla pewności uruchom managera weryfikacji sterowników - Driver Verifier żeby sprawdzić (testuje je) czy system będzie działał stabilnie bez bsodów.
- Kliknij Start, wpisz cmd a potem verifier.exe
- Zaznacz opcję "Utwórz ustawienia niestandardowe".
- Kliknij "Wybierz indywidualne ustawienia z pełnej listy".
- Zaznacz opcje -> Pula specjalna - Śledzenie puli - Wymuszanie sprawdzenia IRQL.
- Kliknij "Wybierz nazwy sterowników z listy" po czym chwilę czekamy.
- Zaznaczamy wszystkie sterowniki nie pochodzące od Microsoft (sortujemy wg kolumny Dostawca).
- Klikamy zakończ, uruchamiamy ponownie komputer i czekamy pracując sobie na złe lub dobre wieści czy system się wysypie bsodem czy nie, sugeruję dobre kilka godzin.
- Wpisujemy verifier.exe /reset aby zakończyć diagnostykę sterowników i uruchamiamy sprzęt ponownie.

Tylko ten bsod wskazuje na wadliwy sterownik tcpip.sys

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-44397-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time:  Sat Sep 29 16: 08: 43.516 2012 (UTC + 2: 00)
System Uptime:  0 days 0: 00: 30.530
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffea80093ce410, 2, 0, fffff80002a3e567}

Probably caused by :  tcpip.sys ( tcpip!IppRestructureHashTableUnderLock+69 )

Followup:  MachineOwner
---------

0:  kd>  !analyze -v;r;kv;lmtn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  ffffea80093ce410, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002a3e567, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002cc70e0
ffffea80093ce410

CURRENT_IRQL:   2

FAULTING_IP:  
nt!RtlExpandHashTable+e7
fffff800`02a3e567 498b5310        mov     rdx,qword ptr [r11+10h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff80000b9c060 -- (.trap 0xfffff80000b9c060)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001fff rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000001abf rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a3e567 rsp=fffff80000b9c1f0 rbp=fffffa8009378000
r8=fffffa800940e400  r9=fffffa80093ce400 r10=fffffa80093ce400
r11=ffffea80093ce400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!RtlExpandHashTable+0xe7:
fffff800`02a3e567 498b5310        mov     rdx,qword ptr [r11+10h] ds: 0001: ffffea80`093ce410=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a90469 to fffff80002a90f00

STACK_TEXT:  
fffff800`00b9bf18 fffff800`02a90469 :  00000000`0000000a ffffea80`093ce410 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff800`00b9bf20 fffff800`02a8f0e0 :  fffff800`00b9c128 fffff880`01787800 fffffa80`07777340 00000000`00000801 :  nt!KiBugCheckDispatch+0x69
fffff800`00b9c060 fffff800`02a3e567 :  fffffa80`07deb010 fffff880`01787800 00000000`00020000 fffff880`00000000 :  nt!KiPageFault+0x260
fffff800`00b9c1f0 fffff880`016567c9 :  fffff880`01787800 fffffa80`07bfbca0 00000000`00000000 00000000`00000000 :  nt!RtlExpandHashTable+0xe7
fffff800`00b9c220 fffff880`0166c206 :  00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016572a0 :  tcpip!IppRestructureHashTableUnderLock+0x69
fffff800`00b9c250 fffff880`0166c559 :  fffffa80`07bb6f00 00000000`00000000 fffff800`00b9c340 fffff800`00b9c390 :  tcpip!IppFlushNeighborSet+0x96
fffff800`00b9c2c0 fffff880`01656da7 :  fffff880`0176b9a0 fffffa80`07bb6f00 fffffa80`07bfbd30 fffffa80`07c1bb58 :  tcpip!IppNeighborSetTimeout+0x23f
fffff800`00b9c410 fffff880`01657488 :  fffffa80`07c1bb58 00000000`00000000 00000000`ffffff00 fffff800`00b9c5c0 :  tcpip!Ipv4pInterfaceSetTimeout+0x1dc
fffff800`00b9c490 fffff880`0165630a :  00000000`00000000 fffff800`00b9c5c0 00000000`00000001 fffff800`02a9aa9a :  tcpip!IppCompartmentSetTimeout+0x88
fffff800`00b9c500 fffff800`02a9cfa6 :  00000000`00000000 00000001`00000000 01535242`40c40089 00000008`00000002 :  tcpip!IppTimeout+0x5a
fffff800`00b9c530 fffff800`02a9c326 :  fffff880`01787880 00000000`000007a5 00000000`00000000 fffffa80`07deac60 :  nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5a0 fffff800`02a9ce7e :  00000000`1232a367 fffff800`00b9cc18 00000000`000007a5 fffff800`02c0d728 :  nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cbf0 fffff800`02a9c697 :  00000000`03f4c9c1 00000000`000007a5 00000000`03f4c916 00000000`000000a4 :  nt!KiTimerExpiration+0x1be
fffff800`00b9cc90 fffff800`02a996fa :  fffff800`02c09e80 fffff800`02c17c40 00000000`00000002 fffff880`00000000 :  nt!KiRetireDpcList+0x277
fffff800`00b9cd40 00000000`00000000 :  fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 :  nt!KiIdleLoop+0x5a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
tcpip!IppRestructureHashTableUnderLock+69
fffff880`016567c9 84c0            test    al,al

SYMBOL_STACK_INDEX:   4

SYMBOL_NAME:   tcpip!IppRestructureHashTableUnderLock+69

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  tcpip

IMAGE_NAME:   tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc26e

FAILURE_BUCKET_ID:   X64_0xA_tcpip!IppRestructureHashTableUnderLock+69

BUCKET_ID:   X64_0xA_tcpip!IppRestructureHashTableUnderLock+69

Followup:  MachineOwner
---------

rax=fffff80000b9c020 rbx=fffff88001787800 rcx=000000000000000a
rdx=ffffea80093ce410 rsi=000000000000003f rdi=0000000000000075
rip=fffff80002a90f00 rsp=fffff80000b9bf18 rbp=fffff80000b9c0e0
r8=0000000000000002  r9=0000000000000000 r10=fffff80002a3e567
r11=fffff6fb7aa00248 r12=0000000000000001 r13=fffff8800176b9a0
r14=fffff80000b9c340 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
nt!KeBugCheckEx:
fffff800`02a90f00 48894c2408      mov     qword ptr [rsp+8],rcx ss: 0018: fffff800`00b9bf20=000000000000000a
Child-SP          RetAddr           :  Args to Child                                                           :  Call Site
fffff800`00b9bf18 fffff800`02a90469 :  00000000`0000000a ffffea80`093ce410 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff800`00b9bf20 fffff800`02a8f0e0 :  fffff800`00b9c128 fffff880`01787800 fffffa80`07777340 00000000`00000801 :  nt!KiBugCheckDispatch+0x69
fffff800`00b9c060 fffff800`02a3e567 :  fffffa80`07deb010 fffff880`01787800 00000000`00020000 fffff880`00000000 :  nt!KiPageFault+0x260 (TrapFrame @ fffff800`00b9c060)
fffff800`00b9c1f0 fffff880`016567c9 :  fffff880`01787800 fffffa80`07bfbca0 00000000`00000000 00000000`00000000 :  nt!RtlExpandHashTable+0xe7
fffff800`00b9c220 fffff880`0166c206 :  00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016572a0 :  tcpip!IppRestructureHashTableUnderLock+0x69
fffff800`00b9c250 fffff880`0166c559 :  fffffa80`07bb6f00 00000000`00000000 fffff800`00b9c340 fffff800`00b9c390 :  tcpip!IppFlushNeighborSet+0x96
fffff800`00b9c2c0 fffff880`01656da7 :  fffff880`0176b9a0 fffffa80`07bb6f00 fffffa80`07bfbd30 fffffa80`07c1bb58 :  tcpip!IppNeighborSetTimeout+0x23f
fffff800`00b9c410 fffff880`01657488 :  fffffa80`07c1bb58 00000000`00000000 00000000`ffffff00 fffff800`00b9c5c0 :  tcpip!Ipv4pInterfaceSetTimeout+0x1dc
fffff800`00b9c490 fffff880`0165630a :  00000000`00000000 fffff800`00b9c5c0 00000000`00000001 fffff800`02a9aa9a :  tcpip!IppCompartmentSetTimeout+0x88
fffff800`00b9c500 fffff800`02a9cfa6 :  00000000`00000000 00000001`00000000 01535242`40c40089 00000008`00000002 :  tcpip!IppTimeout+0x5a
fffff800`00b9c530 fffff800`02a9c326 :  fffff880`01787880 00000000`000007a5 00000000`00000000 fffffa80`07deac60 :  nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5a0 fffff800`02a9ce7e :  00000000`1232a367 fffff800`00b9cc18 00000000`000007a5 fffff800`02c0d728 :  nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cbf0 fffff800`02a9c697 :  00000000`03f4c9c1 00000000`000007a5 00000000`03f4c916 00000000`000000a4 :  nt!KiTimerExpiration+0x1be
fffff800`00b9cc90 fffff800`02a996fa :  fffff800`02c09e80 fffff800`02c17c40 00000000`00000002 fffff880`00000000 :  nt!KiRetireDpcList+0x277
fffff800`00b9cd40 00000000`00000000 :  fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 :  nt!KiIdleLoop+0x5a
start             end                 module name
fffff800`00bc6000 fffff800`00bd0000   kdcom    kdcom.dll    Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`02a1f000 fffff800`02ffc000   nt       ntkrnlmp.exe Tue Jul 14 01: 40: 48 2009 (4A5BC600)
fffff800`02ffc000 fffff800`03045000   hal      hal.dll      Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00cf2000 fffff880`00d36000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 03: 29: 10 2009 (4A5BDF66)
fffff880`00d36000 fffff880`00d4a000   PSHED    PSHED.dll    Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00d4a000 fffff880`00da8000   CLFS     CLFS.SYS     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00da8000 fffff880`00dd2000   ataport  ataport.SYS  Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`00dd2000 fffff880`00ddd000   msahci   msahci.sys   Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`00ddd000 fffff880`00ded000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00ded000 fffff880`00df8000   amdxata  amdxata.sys  Tue May 19 19: 56: 59 2009 (4A12F2EB)
fffff880`00e00000 fffff880`00e09000   compbatt compbatt.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`00e09000 fffff880`00e15000   BATTC    BATTC.SYS    Tue Jul 14 01: 31: 01 2009 (4A5BC3B5)
fffff880`00e15000 fffff880`00e2a000   volmgr   volmgr.sys   Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000   volmgrx  volmgrx.sys  Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00e8e000 fffff880`00f32000   Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00f32000 fffff880`00f41000   WDFLDR   WDFLDR.SYS   Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00f41000 fffff880`00f98000   ACPI     ACPI.sys     Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00f98000 fffff880`00fa1000   WMILIB   WMILIB.SYS   Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fa1000 fffff880`00fab000   msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00fab000 fffff880`00fde000   pci      pci.sys      Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fde000 fffff880`00feb000   vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00feb000 fffff880`01000000   partmgr  partmgr.sys  Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0103a000   rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`01063000 fffff880`010af000   fltmgr   fltmgr.sys   Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`010af000 fffff880`010c3000   fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`010c3000 fffff880`01121000   msrpc    msrpc.sys    Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`01121000 fffff880`01194000   cng      cng.sys      Tue Jul 14 01: 49: 40 2009 (4A5BC814)
fffff880`01194000 fffff880`011e0000   volsnap  volsnap.sys  Tue Jul 14 01: 20: 08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`0121b000 fffff880`01229000   LhdX64   LhdX64.sys   Mon Jan 11 16: 06: 58 2010 (4B4B3E92)
fffff880`0123b000 fffff880`013de000   Ntfs     Ntfs.sys     Tue Jul 14 01: 20: 47 2009 (4A5BC14F)
fffff880`013de000 fffff880`013f8000   ksecdd   ksecdd.sys   Tue Jul 14 01: 20: 54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Tue Jul 14 01: 50: 34 2009 (4A5BC84A)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Tue Jul 14 01: 21: 08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Tue Jul 14 01: 42: 54 2009 (4A5BC67E)
fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`0148f000 fffff880`01581000   ndis     ndis.sys     Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`01581000 fffff880`015e1000   NETIO    NETIO.SYS    Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`015e1000 fffff880`015f3000   mup      mup.sys      Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`015f3000 fffff880`015fc000   hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Tue Jul 14 01: 25: 34 2009 (4A5BC26E)
fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`01847000 fffff880`018a1000   usbhub   usbhub.sys   Tue Jul 14 02: 07: 09 2009 (4A5BCC2D)
fffff880`018a2000 fffff880`018dc000   fvevol   fvevol.sys   Tue Jul 14 01: 22: 15 2009 (4A5BC1A7)
fffff880`018dc000 fffff880`018f2000   disk     disk.sys     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`018f2000 fffff880`01922000   CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`0195a000 fffff880`01984000   cdrom    cdrom.sys    Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`01984000 fffff880`0198d000   Null     Null.SYS     Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`0198d000 fffff880`01994000   Beep     Beep.SYS     Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`01994000 fffff880`019a1000   avgtpx64 avgtpx64.sys Thu Jul 19 16: 07: 13 2012 (50081491)
fffff880`019a1000 fffff880`019af000   vga      vga.sys      Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`019af000 fffff880`019d4000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`019d4000 fffff880`019e4000   watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`019e4000 fffff880`019ed000   RDPCDD   RDPCDD.sys   Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019ed000 fffff880`019f6000   rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019f6000 fffff880`019ff000   rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`0242d000 fffff880`024b9000   bthport  bthport.sys  Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`024b9000 fffff880`024baf00   USBD     USBD.SYS     Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`024bb000 fffff880`024c9000   hidusb   hidusb.sys   Tue Jul 14 02: 06: 22 2009 (4A5BCBFE)
fffff880`024c9000 fffff880`024e2000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02: 06: 21 2009 (4A5BCBFD)
fffff880`024e2000 fffff880`024ea080   HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`024eb000 fffff880`024f8000   mouhid   mouhid.sys   Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`024f8000 fffff880`02524000   rfcomm   rfcomm.sys   Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`02524000 fffff880`02534000   BthEnum  BthEnum.sys  Tue Jul 14 02: 06: 52 2009 (4A5BCC1C)
fffff880`02534000 fffff880`02554000   bthpan   bthpan.sys   Tue Jul 14 02: 07: 00 2009 (4A5BCC24)
fffff880`02554000 fffff880`02571000   usbccgp  usbccgp.sys  Tue Jul 14 02: 06: 45 2009 (4A5BCC15)
fffff880`02571000 fffff880`0259e100   usbvideo usbvideo.sys Tue Jul 14 02: 07: 00 2009 (4A5BCC24)
fffff880`0259f000 fffff880`025ad000   monitor  monitor.sys  Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`02c68000 fffff880`02c77000   discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`02caa000 fffff880`02d34000   afd      afd.sys      Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`02d34000 fffff880`02d79000   netbt    netbt.sys    Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`02d79000 fffff880`02d82000   wfplwf   wfplwf.sys   Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02d82000 fffff880`02da8000   pacer    pacer.sys    Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`02da8000 fffff880`02dbe000   vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`02dbe000 fffff880`02dcd000   netbios  netbios.sys  Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02dcd000 fffff880`02de8000   wanarp   wanarp.sys   Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`02de8000 fffff880`02dfc000   termdd   termdd.sys   Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`03e00000 fffff880`03e43000   ks       ks.sys       Tue Jul 14 02: 00: 31 2009 (4A5BCA9F)
fffff880`03e43000 fffff880`03e58000   NDProxy  NDProxy.SYS  Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`03e8e000 fffff880`03f11000   csc      csc.sys      Tue Jul 14 01: 24: 26 2009 (4A5BC22A)
fffff880`03f11000 fffff880`03f2f000   dfsc     dfsc.sys     Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`03f2f000 fffff880`03f40000   blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`03f40000 fffff880`03f66000   tunnel   tunnel.sys   Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`03f66000 fffff880`03f95000   ndiswan  ndiswan.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`03f95000 fffff880`03fb0000   raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`03fb0000 fffff880`03fd1000   raspptp  raspptp.sys  Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`03fd1000 fffff880`03feb000   rassstp  rassstp.sys  Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`04000000 fffff880`04085000   Rt64win7 Rt64win7.sys Fri Jun 10 08: 33: 15 2011 (4DF1BAAB)
fffff880`04085000 fffff880`04089500   CmBatt   CmBatt.sys   Tue Jul 14 01: 31: 03 2009 (4A5BC3B7)
fffff880`0408a000 fffff880`040a0000   AcpiVpc  AcpiVpc.sys  Fri Nov 26 09: 40: 25 2010 (4CEF7279)
fffff880`040a0000 fffff880`040be000   i8042prt i8042prt.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`040be000 fffff880`040cd000   kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040cd000 fffff880`040dc000   mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040dc000 fffff880`040f2000   intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`040f2000 fffff880`040fb000   wmiacpi  wmiacpi.sys  Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`040fb000 fffff880`040fc480   swenum   swenum.sys   Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`040ff000 fffff880`04392000   athrx    athrx.sys    Wed Nov 24 20: 33: 22 2010 (4CED6882)
fffff880`04392000 fffff880`0439f000   vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`0439f000 fffff880`043af000   CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`043af000 fffff880`043c5000   AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`043c5000 fffff880`043e9000   rasl2tp  rasl2tp.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`043e9000 fffff880`043f5000   ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`043f5000 fffff880`04400000   rdpbus   rdpbus.sys   Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`04e72000 fffff880`04ece000   HdAudio  HdAudio.sys  Tue Jul 14 02: 06: 59 2009 (4A5BCC23)
fffff880`04ece000 fffff880`04f0b000   portcls  portcls.sys  Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`04f0b000 fffff880`04f2d000   drmk     drmk.sys     Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`04f2d000 fffff880`04f32200   ksthunk  ksthunk.sys  Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`04f33000 fffff880`04f89000   IntcDAud IntcDAud.sys Tue Dec 06 12: 23: 07 2011 (4EDDFB1B)
fffff880`04f89000 fffff880`04f97000   crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`04f97000 fffff880`04fa3000   dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`04fa3000 fffff880`04fae000   dump_msahci dump_msahci.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`04fae000 fffff880`04fc1000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`04fc1000 fffff880`04fcd000   Dxapi    Dxapi.sys    Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`04fcd000 fffff880`04fe5000   BTHUSB   BTHUSB.sys   Tue Jul 14 02: 06: 52 2009 (4A5BCC1C)
fffff880`0fe00000 fffff880`0fe11000   HECIx64  HECIx64.sys  Wed Oct 20 01: 33: 43 2010 (4CBE2AD7)
fffff880`0fe11000 fffff880`0fe22000   usbehci  usbehci.sys  Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`0fe22000 fffff880`0fe78000   USBPORT  USBPORT.SYS  Tue Jul 14 02: 06: 31 2009 (4A5BCC07)
fffff880`0fe78000 fffff880`0fe9c000   HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`0fe9c000 fffff880`0feae000   umbus    umbus.sys    Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`0feb0000 fffff880`10cc0000   igdkmd64 igdkmd64.sys Tue Mar 20 00: 31: 54 2012 (4F67C1EA)
fffff880`10cc0000 fffff880`10db4000   dxgkrnl  dxgkrnl.sys  Tue Jul 14 01: 38: 56 2009 (4A5BC590)
fffff880`10db4000 fffff880`10dfa000   dxgmms1  dxgmms1.sys  Tue Jul 14 01: 38: 32 2009 (4A5BC578)
fffff960`00040000 fffff960`0034f000   win32k   win32k.sys   unavailable (00000000)
fffff960`005c0000 fffff960`005ca000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      unavailable (00000000)

Unloaded modules:
fffff880`01922000 fffff880`01930000   crashdmp.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000E000
fffff880`01930000 fffff880`0193c000   dump_pciidex
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000C000
fffff880`0193c000 fffff880`01947000   dump_msahci.
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000B000
fffff880`01947000 fffff880`0195a000   dump_dumpfve
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00013000
Bugcheck code 0000000A
Arguments ffffea80`093ce410 00000000`00000002 00000000`00000000 fffff800`02a3e567
[CPU Information]
~MHz = REG_DWORD 2195
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 42 Stepping 7
ProcessorNameString = REG_SZ Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz
Update Signature = REG_BINARY 0,0,0,0,1b,0,0,0
Update Status = REG_DWORD 2
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 1b00000000
Machine ID Information [From Smbios 2.6, DMIVersion 38, Size=2475]
BiosMajorRelease = 1
BiosMinorRelease = 66
FirmwareMajorRelease = 1
FirmwareMinorRelease = 41
BiosVendor = LENOVO
BiosVersion = 44CN42WW
BiosReleaseDate = 09/22/2011
SystemManufacturer = LENOVO
SystemProductName = HuronRiver Platform
SystemFamily = HuronRiver System
SystemVersion = Lenovo B570
SystemSKU = System SKUNumber
BaseBoardManufacturer = LENOVO
BaseBoardProduct = Emerald Lake
BaseBoardVersion = FAB1
CPUID:         "Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz"
MaxSpeed:      2200
CurrentSpeed:  2195
[SMBIOS Data Tables v2.6]
[DMI Version - 38]
[2.0 Calling Convention - No]
[Table Size - 2475 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]
  Vendor                        LENOVO
  BIOS Version                  44CN42WW
  BIOS Starting Address Segment e000
  BIOS Release Date             09/22/2011
  BIOS ROM Size                 280000
  BIOS Characteristics
       07:  - PCI Supported
       11:  - Upgradeable FLASH BIOS
       12:  - BIOS Shadowing Supported
       15:  - CD-Boot Supported
       16:  - Selectable Boot Supported
       19:  - EDD Supported
       26:  - Print Screen Device Supported
       27:  - Keyboard Services Supported
       28:  - Serial Services Supported
       29:  - Printer Services Supported
       30:  - CGA/Mono Services Supported
       31:  - NEC PC-98
       49:  - System Vendor Reserved
       51:  - System Vendor Reserved
       52:  - System Vendor Reserved
  BIOS Characteristic Extensions
       00:  - ACPI Supported
       01:  - USB Legacy Supported
       08:  - BIOS Boot Specification Supported
       09:  - Fn-Key NET-Boot Supported
       10:  - Specification Reserved
  BIOS Major Revision           1
  BIOS Minor Revision           66
  EC Firmware Major Revision    1
  EC Firmware Minor Revision    41
[System Information (Type 1) - Length 27 - Handle 0001h]
  Manufacturer                  LENOVO
  Product Name                  HuronRiver Platform
  Version                       Lenovo B570
  Serial Number                                    
  UUID                          00000000-0000-0000-0000-000000000000
  Wakeup Type                   Other
  SKUNumber                     System SKUNumber
  Family                        HuronRiver System
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  Manufacturer                  LENOVO
  Product                       Emerald Lake
  Version                       FAB1
  Serial Number                          
  Asset Tag                                        
  Feature Flags                 09h
       1511734644:  - °c7
       1511734604:  - °c7
  Location                      Part Component
  Chassis Handle                0000h
  Board Type                    0ah - Processor/Memory Module
  Number of Child Handles       0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
  Manufacturer                  LENOVO
  Chassis Type                  Notebook
  Version                       0.1
  Serial Number                        
  Asset Tag Number                      
  Bootup State                  Safe
  Power Supply State            Safe
  Thermal State                 Other
  Security Status               Other
  OEM Defined                   0
  Height                        0U
  Number of Power Cords         1
  Number of Contained Elements  0
  Contained Element Size        0
[Onboard Devices Information (Type 10) - Length 6 - Handle 0022h]
  Number of Devices             1
  01:  Type                      Video [enabled]
  01:  Description               Intel(R) Extreme Graphics 3 Controller
[Onboard Devices Information (Type 10) - Length 6 - Handle 0023h]
  Number of Devices             1
  01:  Type                      Sound [enabled]
  01:  Description               Intel(R) Azalia Audio Device
[OEM Strings (Type 11) - Length 5 - Handle 0024h]
  Number of Strings             1
   1                            This is the Intel HuronRiver CRB Platform
[System Configuration Options (Type 12) - Length 5 - Handle 0025h]
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 002ah]
[Processor Information (Type 4) - Length 42 - Handle 0030h]
  Socket Designation            CPU
  Processor Type                Central Processor
  Processor Family              ceh - Specification Reserved
  Processor Manufacturer        Intel(R) Corporation
  Processor ID                  a7060200fffbebbf
  Processor Version             Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz
  Processor Voltage             8ch - 1.2V
  External Clock                100MHz
  Max Speed                     2200MHz
  Current Speed                 2200MHz
  Status                        Enabled Populated
  Processor Upgrade             ZIF Socket
  L1 Cache Handle               0031h
  L2 Cache Handle               0032h
  L3 Cache Handle               0033h
  Serial Number                                    
  Asset Tag Number                        
  Part Number                   TBD By OEM
[Cache Information (Type 7) - Length 19 - Handle 0031h]
  Socket Designation            L1-Cache
  Cache Configuration           0080h - WT Enabled Int NonSocketed L1
  Maximum Cache Size            0040h - 64K
  Installed Size                0040h - 64K
  Supported SRAM Type           0020h - Synchronous
  Current SRAM Type             0020h - Synchronous
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Data
  Associativity                 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0032h]
  Socket Designation            L2-Cache
  Cache Configuration           0081h - WT Enabled Int NonSocketed L2
  Maximum Cache Size            0100h - 256K
  Installed Size                0100h - 256K
  Supported SRAM Type           0020h - Synchronous
  Current SRAM Type             0020h - Synchronous
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Data
  Associativity                 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0033h]
  Socket Designation            L3-Cache
  Cache Configuration           0182h - WB Enabled Int NonSocketed L3
  Maximum Cache Size            0c00h - 3072K
  Installed Size                0c00h - 3072K
  Supported SRAM Type           0020h - Synchronous
  Current SRAM Type             0020h - Synchronous
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Unified
  Associativity                 Specification Reserved
[Physical Memory Array (Type 16) - Length 15 - Handle 0034h]
  Location                      03h - SystemBoard/Motherboard
  Use                           03h - System Memory
  Memory Error Correction       03h - None
  Maximum Capacity              16777216KB
  Memory Error Inf Handle       [Not Provided]
  Number of Memory Devices      4
[Memory Device (Type 17) - Length 28 - Handle 0035h]
  Physical Memory Array Handle  0034h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          4096MB
  Form Factor                   0dh - SODIMM
  Device Set                    [None]
  Device Locator                ChannelA-DIMM0
  Bank Locator                  BANK 0
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         1333MHz
  Manufacturer                  0443
  Serial Number                        
  Asset Tag Number                        
  Part Number                   RMT3020EC58E9F1333
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0036h]
  Starting Address              00000000h
  Ending Address                003fffffh
  Memory Device Handle          0035h
  Mem Array Mapped Adr Handle   003dh
  Partition Row Position        [Unknown]
  Interleave Position           01
  Interleave Data Depth         02
[Memory Device (Type 17) - Length 28 - Handle 0037h]
  Physical Memory Array Handle  0034h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelA-DIMM1
  Bank Locator                  BANK 1
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [String Not Specified]
  Serial Number                 [String Not Specified]
  Asset Tag Number                        
  Part Number                   [String Not Specified]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0038h]
  Starting Address              00000000h
  Ending Address                00000000h
  Memory Device Handle          0037h
  Mem Array Mapped Adr Handle   003dh
  Partition Row Position        [Unknown]
  Interleave Position           01
  Interleave Data Depth         02
[Memory Device (Type 17) - Length 28 - Handle 0039h]
  Physical Memory Array Handle  0034h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          4096MB
  Form Factor                   0dh - SODIMM
  Device Set                    [None]
  Device Locator                ChannelB-DIMM0
  Bank Locator                  BANK 2
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         1333MHz
  Manufacturer                  830B
  Serial Number                        
  Asset Tag Number                        
  Part Number                   NT4GC64B8HB0NS-CG
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ah]
  Starting Address              00400000h
  Ending Address                007fffffh
  Memory Device Handle          0039h
  Mem Array Mapped Adr Handle   003dh
  Partition Row Position        [Unknown]
  Interleave Position           02
  Interleave Data Depth         02
[Memory Device (Type 17) - Length 28 - Handle 003bh]
  Physical Memory Array Handle  0034h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                ChannelB-DIMM1
  Bank Locator                  BANK 3
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [String Not Specified]
  Serial Number                 [String Not Specified]
  Asset Tag Number                        
  Part Number                   [String Not Specified]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ch]
  Starting Address              00000000h
  Ending Address                00000000h
  Memory Device Handle          003bh
  Mem Array Mapped Adr Handle   003dh
  Partition Row Position        [Unknown]
  Interleave Position           02
  Interleave Data Depth         02
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 003dh]
  Starting Address              00000000h
  Ending Address                007fffffh
  Memory Array Handle           0034h
  Partition Width               04

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-35349-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a57000 PsLoadedModuleList = 0xfffff800`02c94e50
Debug session time:  Sat Sep 29 15: 36: 13.986 2012 (UTC + 2: 00)
System Uptime:  0 days 3: 29: 43.001
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff68800388a20, 0, fffff80002adcae2, 5}


Could not read faulting driver name
Probably caused by :  memory_corruption ( nt!MiAgeWorkingSet+1c2 )

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1:  fffff68800388a20, memory referenced.
Arg2:  0000000000000000, value 0 = read operation, 1 = write operation.
Arg3:  fffff80002adcae2, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4:  0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002cff0e0
fffff68800388a20

FAULTING_IP:  
nt!MiAgeWorkingSet+1c2
fffff800`02adcae2 488b19          mov     rbx,qword ptr [rcx]

MM_INTERNAL_CODE:   5

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x50

PROCESS_NAME:   chrome.exe

CURRENT_IRQL:   0

TRAP_FRAME:   fffff88003316760 -- (.trap 0xfffff88003316760)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff68800388a20
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002adcae2 rsp=fffff880033168f0 rbp=0000000800388a20
r8=0000000000000001  r9=fffffa80072dbc08 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!MiAgeWorkingSet+0x1c2:
fffff800`02adcae2 488b19          mov     rbx,qword ptr [rcx] ds: fffff688`00388a20=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002b46b91 to fffff80002ac8f00

STACK_TEXT:  
fffff880`033165f8 fffff800`02b46b91 :  00000000`00000050 fffff688`00388a20 00000000`00000000 fffff880`03316760 :  nt!KeBugCheckEx
fffff880`03316600 fffff800`02ac6fee :  00000000`00000000 00000980`00000000 00000000`00001000 fffff800`02bfbbfe :  nt! ? : FNODOBFM: `string'+0x40f5b
fffff880`03316760 fffff800`02adcae2 :  00000003`00000000 36e00000`6fbc9025 00000000`00000000 00000000`00000b6e :  nt!KiPageFault+0x16e
fffff880`033168f0 fffff800`02b49a0e :  fffffa80`072dbc08 fffff880`00000001 00000000`00000001 fffff880`03316b70 :  nt!MiAgeWorkingSet+0x1c2
fffff880`03316aa0 fffff800`02add6e2 :  00000000`00000b6f 00000000`00000000 fffffa80`00000000 00000000`00000005 :  nt! ? : FNODOBFM: `string'+0x49926
fffff880`03316b40 fffff800`02add96f :  00000000`00000008 fffff880`03316bd0 00000000`00000001 fffffa80`00000000 :  nt!MmWorkingSetManager+0x6e
fffff880`03316b90 fffff800`02d6c166 :  fffffa80`06d3f040 00000000`00000080 fffffa80`06d15890 00000000`00000001 :  nt!KeBalanceSetManager+0x1c3
fffff880`03316d00 fffff800`02aa7486 :  fffff880`009e4180 fffffa80`06d3f040 fffff880`009eefc0 0000000d`5ed44f8f :  nt!PspSystemThreadStartup+0x5a
fffff880`03316d40 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KxStartSystemThread+0x16


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nt!MiAgeWorkingSet+1c2
fffff800`02adcae2 488b19          mov     rbx,qword ptr [rcx]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   nt!MiAgeWorkingSet+1c2

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc600

IMAGE_NAME:   memory_corruption

FAILURE_BUCKET_ID:   X64_0x50_nt!MiAgeWorkingSet+1c2

BUCKET_ID:   X64_0x50_nt!MiAgeWorkingSet+1c2

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-33524-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
Debug session time:  Sat Sep 29 12: 05: 39.963 2012 (UTC + 2: 00)
System Uptime:  0 days 0: 01: 22.978
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41284, 30b2001, a5f, fffff70001080000}

Probably caused by :  ntkrnlmp.exe ( nt! ? : FNODOBFM: `string'+4ac3 )

Followup:  MachineOwner
---------

0:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1:  0000000000041284, A PTE or the working set list is corrupt.
Arg2:  00000000030b2001
Arg3:  0000000000000a5f
Arg4:  fffff70001080000

Debugging Details:
------------------


BUGCHECK_STR:   0x1a_41284

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   TrustedInstall

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from fffff80002b23a63 to fffff80002accf00

STACK_TEXT:  
fffff880`0609c8e8 fffff800`02b23a63 :  00000000`0000001a 00000000`00041284 00000000`030b2001 00000000`00000a5f :  nt!KeBugCheckEx
fffff880`0609c8f0 fffff800`02afdc15 :  fffff700`01080000 a5f00002`091df867 fffffa80`094b8b30 fffffa80`094b0400 :  nt! ? : FNODOBFM: `string'+0x4ac3
fffff880`0609c930 fffff800`02b0ec4a :  00000000`00000000 00000000`0312ffff fffffa80`00000000 fffffa80`094b8b30 :  nt!MiDeleteVirtualAddresses+0x4cc
fffff880`0609caf0 fffff800`02acc153 :  ffffffff`ffffffff 00000000`011cf7b8 00000000`011cf7b0 fffffa80`00008000 :  nt!NtFreeVirtualMemory+0x5ca
fffff880`0609cbe0 00000000`77bb009a :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiSystemServiceCopyEnd+0x13
00000000`011cf738 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  0x77bb009a


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nt! ? : FNODOBFM: `string'+4ac3
fffff800`02b23a63 cc              int     3

SYMBOL_STACK_INDEX:   1

SYMBOL_NAME:   nt! ? : FNODOBFM: `string'+4ac3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

IMAGE_NAME:   ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc600

FAILURE_BUCKET_ID:   X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3

BUCKET_ID:   X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-28610-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0280a000 PsLoadedModuleList = 0xfffff800`02a47e50
Debug session time:  Sat Sep 29 12: 03: 19.881 2012 (UTC + 2: 00)
System Uptime:  0 days 1: 38: 38.895
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a0169c8148, 0, fffff80002b6d1fc, 7}


Could not read faulting driver name
Probably caused by :  ntkrnlmp.exe ( nt!CmpRemoveKeyHash+4c )

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1:  ffffe8a0169c8148, memory referenced.
Arg2:  0000000000000000, value 0 = read operation, 1 = write operation.
Arg3:  fffff80002b6d1fc, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4:  0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002ab20e0
ffffe8a0169c8148

FAULTING_IP:  
nt!CmpRemoveKeyHash+4c
fffff800`02b6d1fc 488b01          mov     rax,qword ptr [rcx]

MM_INTERNAL_CODE:   7

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x50

PROCESS_NAME:   System

CURRENT_IRQL:   0

TRAP_FRAME:   fffff880031bd9f0 -- (.trap 0xfffff880031bd9f0)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe8a0169c8140 rbx=0000000000000000 rcx=ffffe8a0169c8148
rdx=0000000000000bbe rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b6d1fc rsp=fffff880031bdb88 rbp=fffff880031bdc04
r8=00000000b2d05e15  r9=000000001f3d0fea r10=fffff8a00767f6f8
r11=fffff8a0167c25e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CmpRemoveKeyHash+0x4c:
fffff800`02b6d1fc 488b01          mov     rax,qword ptr [rcx] ds: 0001: ffffe8a0`169c8148=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff800028f9b19 to fffff8000287bf00

STACK_TEXT:  
fffff880`031bd888 fffff800`028f9b19 :  00000000`00000050 ffffe8a0`169c8148 00000000`00000000 fffff880`031bd9f0 :  nt!KeBugCheckEx
fffff880`031bd890 fffff800`02879fee :  00000000`00000000 fffff8a0`167c25d0 fffffa80`07e68100 fffff880`01287cc3 :  nt! ? : FNODOBFM: `string'+0x40edb
fffff880`031bd9f0 fffff800`02b6d1fc :  fffff800`02b6d3c2 fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000001 :  nt!KiPageFault+0x16e
fffff880`031bdb88 fffff800`02b6d3c2 :  fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000001 00000000`00000000 :  nt!CmpRemoveKeyHash+0x4c
fffff880`031bdb90 fffff800`02ad36ce :  fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000000 fffff880`02c43bf0 :  nt!CmpCleanUpKcbCacheWithLock+0x52
fffff880`031bdbc0 fffff800`02889161 :  fffff800`02ad3394 fffff800`02a1f5f8 fffffa80`06d1b040 00000000`00000000 :  nt!CmpDelayCloseWorker+0x33a
fffff880`031bdc70 fffff800`02b1f166 :  6c437465`53746547 fffffa80`06d1b040 00000000`00000080 fffffa80`06d03890 :  nt!ExpWorkerThread+0x111
fffff880`031bdd00 fffff800`0285a486 :  fffff880`02fd5180 fffffa80`06d1b040 fffff880`02fdffc0 2873255f`65636976 :  nt!PspSystemThreadStartup+0x5a
fffff880`031bdd40 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KxStartSystemThread+0x16


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nt!CmpRemoveKeyHash+4c
fffff800`02b6d1fc 488b01          mov     rax,qword ptr [rcx]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   nt!CmpRemoveKeyHash+4c

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

IMAGE_NAME:   ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc600

FAILURE_BUCKET_ID:   X64_0x50_nt!CmpRemoveKeyHash+4c

BUCKET_ID:   X64_0x50_nt!CmpRemoveKeyHash+4c

Followup:  MachineOwner
---------
Dziś rano odpaliłem kompa i po 30 minutach pracy posypał si
ę. Ok 10 włączyłem verifier.exe, zainstalowałem AV i przez 3h na włączonym verifier.exe żadnego bsoda, teraz wyłączyłem verifiera i zobaczymy jak będzie. Czy co to oznacza ? że system sypie się przez jakiś sterownik nie z microsoftu ? zapomniałem dodać, że nawet czysty system, bez żadnych sterowników się sypie.
Jak się sypie na czystym to oddałbym go na gwarancję. Uruchom na parę godzin memtest86. Opis how-to jest w faq na forum albo wielu stronach w sieci.
Na gwarancji był i napisali tylko że reinstalacja systemu, uruchomię jutro memtest86 i dam znać co i jak.
Był w serwisie Lenovo czy może sprzedawca ma własny serwis i zanim pośle sprzęt najpierw sprawdza i siebie. ?
Był w Lenovo w Bydgoszczy i na kartce zaznaczyli "System operacyjny przeinstalowany" ale usunęli tylko. W informacjach napisali "*DIAG_INFO*-BSOD. OS reboots. OKR didn't help.HW/OS PW: n/aDLPBOX". Już sam nie wiem co robić :/ może ja go źle formatuje coś, może dać go do jakiegoś informatyka żeby zainstalował system.
Z tego widać był w autoryzowanym serwisie Lenovo gdyż
"*DIAG_INFO*-BSOD. OS reboots oznacz opis przyjętej usterki, OKR znaczy OneKeyRecovery czyli przywrócenie fabrycznego systemu nie działa (sprzedany bez systemu albo wyciąłeś go).

Świeży system i sterowniki tylko ze strony producenta. Jak pisałem zrób sobie kopię zapasową, żebyś tego na sarmo nie powtarzał ze 100 razy.
Od tamtego czasu pożyczyłem Windowsa XP Professional i na nim wszystko śmigało OK, przez ten miesiąc tylko raz się posypał. Teraz znów postanowiłem się pomęczyć z 7 i nadal to samo :/ ściągałem sterowniki tylko ze strony Lenovo i nadal się sypie, nawet na czystej 7.

krzysiekl7

Cytat.

"Od tamtego czasu pożyczyłem Windowsa XP Professional" .

Pożyczone tak mają nie tylko u ciebie.
Przekierowanie