Przejrzałem i co z tego dla mnie wynika:
Numer jeden:
BugCheck
3B, {c0000005, fffff80002b5e105, fffff880075fcc90, 0}
Probably caused by : memory_corruption (
nt!MiGetTopLevelPfn+65 )
Ze zrzutu tego wynika dość jednoznacznie uszkodzoną listę PFN. W skrócie PFN określa bazę posegregowanych ramek pamięci (fizyczne odnośniki) - jest ona umieszczona w pamięci wirtualnej celem przyspieszenia działania odwołań do pamięci (w dużym skrócie, po prostu, żeby nie przeszukiwać bo to by długo trwało). I teraz jakiś krecik w postaci sterownika narusza tę strukturę która się potem okazuje nie pasuje do tego czego inny element systemu próbuje się odwołać po wcześniejszym tam umieszczeniu informacji gdzie są konkretne jego dane.
Jest to efektem działania oprogramowania dodatkowego tzw third party. Może to być najczęściej (i to się sprawdza) aplikacje antywirusowe, firewalle, programy do wirtualizacji napędów typu Daemon Tools itp.
Bardzo rzadko się zdarza aby to był przypadek czystko sprzętowy jak pisze w opisie - memory corruption
Na dole pierwszego zrzutu który debugowałem jest kompletna konfiguracja sprzętowa gdyż jej nie podałeś.
Nie wiem też czy podesłałeś wszystkie zrzuty bo nie mam tu nic o ntoskrnl.exe i dxgmms1.sys.
Z mojego punktu widzenia jakie działania należy podjąć:
- nie zaszkodzi przelecieć pamięć RAM memtest86 przez kilka godzin (prewencyjnie)
- usuwamy wszelkie oprogramowanie firm trzecich o których pisałem
- większość załadowanych modułów ma daty z 2009 więc nie są już świeże, to co można zaktualizować, a przede wszystkim zainstalować SP1 (jeśli pirat to oops)
- sprawdzić czy wszystkie dotychczasowo sterowniki są podpisane cyfrowo - to ważne z punktu wiedzenia bsodów które podesłałeś narzędziem w wierszu poleceń (z podniesionymi uprawnieniami) -> Sigverif.exe
- przeprowadzić weryfikację sterowników
Cytat:- Kliknij Start, wpisz cmd a potem verifier.exe
- Zaznacz opcję "Utwórz ustawienia niestandardowe".
- Kliknij "Wybierz indywidualne ustawienia z pełnej listy".
- Zaznacz opcje -> Pula specjalna - Śledzenie puli - Wymuszanie sprawdzenia IRQL.
- Kliknij "Wybierz nazwy sterowników z listy" po czym chwilę czekamy.
- Zaznaczamy wszystkie sterowniki nie pochodzące od Microsoft (sortujemy wg kolumny Dostawca).
- Klikamy zakończ, uruchamiamy ponownie komputer i czekamy pracując sobie na złe lub dobre wieści czy system się wysypie bsodem czy nie, sugeruję dobre kilka godzin.
- Wpisujemy verifier.exe /reset aby zakończyć diagnostykę sterowników i uruchamiamy sprzęt ponownie.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002b5e105, fffff880075fcc90, 0}
Probably caused by : memory_corruption ( nt!MiGetTopLevelPfn+65 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002b5e105, Address of the instruction which caused the bugcheck
Arg3: fffff880075fcc90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
nt!MiGetTopLevelPfn+65
fffff800`02b5e105 4c8b4928 mov r9,qword ptr [rcx+28h]
CONTEXT: fffff880075fcc90 -- (.cxr 0xfffff880075fcc90)
rax=000ffffffffff7fd rbx=000fffffffffffff rcx=02fffa7ffffe7f70
rdx=fffffff5557ca9cf rsi=fffffa8003a81000 rdi=0000058000000000
rip=fffff80002b5e105 rsp=fffff880075fd678 rbp=0000000000000000
r8=fffffe00075fd6b0 r9=000ffffffffff7fd r10=fffff880075fd728
r11=0000000000000001 r12=000000003ffffff8 r13=0000000000000000
r14=fffff6fb40000000 r15=0000000fffffffff
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiGetTopLevelPfn+0x65:
fffff800`02b5e105 4c8b4928 mov r9,qword ptr [rcx+28h] ds: 002b: 02fffa7f`fffe7f98=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002b5e105
STACK_TEXT:
fffff880`075fd678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetTopLevelPfn+0x65
FOLLOWUP_IP:
nt!MiGetTopLevelPfn+65
fffff800`02b5e105 4c8b4928 mov r9,qword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetTopLevelPfn+65
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff880075fcc90 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
BUCKET_ID: X64_0x3B_nt!MiGetTopLevelPfn+65
Followup: MachineOwner
---------
rax=fffff880075fc4d0 rbx=fffff80002c1e1e8 rcx=000000000000003b
rdx=00000000c0000005 rsi=fffff80002a5e000 rdi=0000000000000000
rip=fffff80002acff00 rsp=fffff880075fc3c8 rbp=0000000000000000
r8=fffff80002b5e105 r9=fffff880075fcc90 r10=0000000000000000
r11=fffff880075fc5c8 r12=fffff80002acf153 r13=fffff80002cdc354
r14=fffff80002aced40 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
nt!KeBugCheckEx:
fffff800`02acff00 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff880`075fc3d0=000000000000003b
Child-SP RetAddr : Args to Child : Call Site
fffff880`075fc3c8 fffff800`02acf469 : 00000000`0000003b 00000000`c0000005 fffff800`02b5e105 fffff880`075fcc90 : nt!KeBugCheckEx
fffff880`075fc3d0 fffff800`02acedbc : fffff880`075fc610 fffff800`02aa77b5 fffff800`02c2d200 fffff880`075fd840 : nt!KiBugCheckDispatch+0x69
fffff880`075fc510 fffff800`02af5bed : fffff800`02cf154c fffff800`02c165b4 fffff800`02a5e000 fffff880`075fd438 : nt!KiSystemServiceHandler+0x7c
fffff880`075fc550 fffff800`02afd250 : fffff800`02c1e1e8 fffff880`075fc5c8 fffff880`075fd438 fffff800`02a5e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`075fc580 fffff800`02b0a1b5 : fffff880`075fd438 fffff880`075fcc90 fffff880`00000000 00000580`00000000 : nt!RtlDispatchException+0x410
fffff880`075fcc60 fffff800`02acf542 : fffff880`075fd438 000fffff`ffffffff fffff880`075fd4e0 fffffa80`03a81000 : nt!KiDispatchException+0x135
fffff880`075fd300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
start end module name
fffff800`00bbc000 fffff800`00bc6000 kdcom kdcom.dll Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`02a15000 fffff800`02a5e000 hal hal.dll Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff800`02a5e000 fffff800`0303b000 nt ntkrnlmp.exe Tue Jul 14 01: 40: 48 2009 (4A5BC600)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00cc8000 fffff880`00cd5000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00cd5000 fffff880`00ce9000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00ce9000 fffff880`00d47000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d47000 fffff880`00deb000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00deb000 fffff880`00dfa000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00e00000 fffff880`00e0d000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00e20000 fffff880`00f94000 sptd sptd.sys Sat Aug 18 23: 05: 38 2012 (503003A2)
fffff880`00f94000 fffff880`00feb000 ACPI ACPI.sys Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00feb000 fffff880`00ff4000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00ff4000 fffff880`00ffe000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0102f000 SCSIPORT SCSIPORT.SYS Tue Jul 14 02: 01: 04 2009 (4A5BCAC0)
fffff880`0102f000 fffff880`01049000 mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`01049000 fffff880`01052000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01052000 fffff880`0107c000 ataport ataport.SYS Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`0107c000 fffff880`01087000 amdxata amdxata.sys Tue May 19 19: 56: 59 2009 (4A12F2EB)
fffff880`01087000 fffff880`010d3000 fltmgr fltmgr.sys Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`010d3000 fffff880`010e7000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`010fe000 fffff880`01131000 pci pci.sys Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`01131000 fffff880`01146000 partmgr partmgr.sys Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01146000 fffff880`0115b000 volmgr volmgr.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`0115b000 fffff880`011b7000 volmgrx volmgrx.sys Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`011b7000 fffff880`011be000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`011be000 fffff880`011ce000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`011ce000 fffff880`011ee000 jraid jraid.sys Mon Jan 11 12: 28: 18 2010 (4B4B0B52)
fffff880`01215000 fffff880`01224000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`01226000 fffff880`013c9000 Ntfs Ntfs.sys Tue Jul 14 01: 20: 47 2009 (4A5BC14F)
fffff880`013c9000 fffff880`013f9000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Tue Jul 14 01: 22: 15 2009 (4A5BC1A7)
fffff880`01441000 fffff880`0149f000 msrpc msrpc.sys Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`0149f000 fffff880`014b9000 ksecdd ksecdd.sys Tue Jul 14 01: 20: 54 2009 (4A5BC156)
fffff880`014b9000 fffff880`0152c000 cng cng.sys Tue Jul 14 01: 49: 40 2009 (4A5BC814)
fffff880`0152c000 fffff880`0153d000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`0153d000 fffff880`01547000 Fs_Rec Fs_Rec.sys Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`01547000 fffff880`01593000 volsnap volsnap.sys Tue Jul 14 01: 20: 08 2009 (4A5BC128)
fffff880`01593000 fffff880`015cd000 rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`015cd000 fffff880`015e3000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`015e3000 fffff880`015eb000 AtiPcie AtiPcie.sys Tue May 05 17: 00: 22 2009 (4A005486)
fffff880`01600000 fffff880`0164a000 fwpkclnt fwpkclnt.sys Tue Jul 14 01: 21: 08 2009 (4A5BC164)
fffff880`0164a000 fffff880`01653000 hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01656000 fffff880`01748000 ndis ndis.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`01748000 fffff880`017a8000 NETIO NETIO.SYS Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`017a8000 fffff880`017d3000 ksecpkg ksecpkg.sys Tue Jul 14 01: 50: 34 2009 (4A5BC84A)
fffff880`017d3000 fffff880`017e3000 vmstorfl vmstorfl.sys Tue Jul 14 01: 42: 54 2009 (4A5BC67E)
fffff880`017e3000 fffff880`017eb000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`017eb000 fffff880`017fd000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01802000 fffff880`019ff000 tcpip tcpip.sys Tue Jul 14 01: 25: 34 2009 (4A5BC26E)
fffff880`02600000 fffff880`0262b000 epfw epfw.sys Thu May 14 15: 12: 55 2009 (4A0C18D7)
fffff880`0262b000 fffff880`02640000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`02640000 fffff880`02693000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`02693000 fffff880`026a6000 ndisuio ndisuio.sys Tue Jul 14 02: 09: 25 2009 (4A5BCCB5)
fffff880`026a6000 fffff880`026be000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`026be000 fffff880`026f4000 fastfat fastfat.SYS Tue Jul 14 01: 23: 28 2009 (4A5BC1F0)
fffff880`026f4000 fffff880`027b7000 eamon eamon.sys Thu May 14 15: 30: 49 2009 (4A0C1D09)
fffff880`027b7000 fffff880`027da000 ehdrv ehdrv.sys Thu May 14 15: 32: 02 2009 (4A0C1D52)
fffff880`027da000 fffff880`027fb000 WudfPf WudfPf.sys Tue Jul 14 02: 05: 37 2009 (4A5BCBD1)
fffff880`02c00000 fffff880`02c26000 pacer pacer.sys Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`02c26000 fffff880`02c3c000 vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`02c46000 fffff880`02c70000 cdrom cdrom.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`02c70000 fffff880`02c79000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`02c79000 fffff880`02c80000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`02c80000 fffff880`02c8e000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`02c8e000 fffff880`02cb3000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`02cb3000 fffff880`02cc3000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`02cc3000 fffff880`02ccc000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`02ccc000 fffff880`02cd5000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`02cd5000 fffff880`02cde000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`02cde000 fffff880`02ce9000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`02ce9000 fffff880`02cfa000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`02cfa000 fffff880`02d18000 tdx tdx.sys Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`02d18000 fffff880`02d25000 TDI TDI.SYS Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`02d25000 fffff880`02daf000 afd afd.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`02daf000 fffff880`02df4000 netbt netbt.sys Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`02df4000 fffff880`02dfd000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`03a00000 fffff880`03a23000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`03a3c000 fffff880`03a59000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`03a59000 fffff880`03a74000 wanarp wanarp.sys Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`03a74000 fffff880`03a88000 termdd termdd.sys Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`03a88000 fffff880`03ad9000 rdbss rdbss.sys Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`03ad9000 fffff880`03ae5000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`03ae5000 fffff880`03af0000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`03af0000 fffff880`03aff000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`03aff000 fffff880`03b82000 csc csc.sys Tue Jul 14 01: 24: 26 2009 (4A5BC22A)
fffff880`03b82000 fffff880`03ba0000 dfsc dfsc.sys Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`03ba0000 fffff880`03bb1000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`03bb1000 fffff880`03bd7000 tunnel tunnel.sys Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`03bd7000 fffff880`03bec000 amdppm amdppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`03c00000 fffff880`03c2f000 ndiswan ndiswan.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`03c2f000 fffff880`03c4a000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`03c4a000 fffff880`03c6b000 raspptp raspptp.sys Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`03c6b000 fffff880`03c85000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`03c85000 fffff880`03c94000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`03c94000 fffff880`03ca3000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`03ca3000 fffff880`03caf000 dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`03caf000 fffff880`03cb8000 dump_atapi dump_atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`03cb8000 fffff880`03ccb000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`03cdd000 fffff880`03d3c000 atikmpag atikmpag.sys Wed Jul 04 07: 10: 55 2012 (4FF3D05F)
fffff880`03d3c000 fffff880`03d92000 USBPORT USBPORT.SYS Tue Jul 14 02: 06: 31 2009 (4A5BCC07)
fffff880`03d92000 fffff880`03de3000 ab4eewxj ab4eewxj.SYS Tue Dec 27 23: 30: 45 2011 (4EFA4715)
fffff880`04200000 fffff880`04210000 CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`04210000 fffff880`0421b000 Epfwndis Epfwndis.sys Thu May 14 15: 12: 52 2009 (4A0C18D4)
fffff880`0421e000 fffff880`04312000 dxgkrnl dxgkrnl.sys Tue Jul 14 01: 38: 56 2009 (4A5BC590)
fffff880`04312000 fffff880`04358000 dxgmms1 dxgmms1.sys Tue Jul 14 01: 38: 32 2009 (4A5BC578)
fffff880`04358000 fffff880`0437c000 HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`0437c000 fffff880`043ac000 nusb3xhc nusb3xhc.sys Fri Jan 22 04: 22: 21 2010 (4B5919ED)
fffff880`043ac000 fffff880`043adf00 USBD USBD.SYS Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`043ae000 fffff880`043bb000 usbfilter usbfilter.sys Wed Oct 07 09: 44: 08 2009 (4ACC46C8)
fffff880`043bb000 fffff880`043c6000 usbohci usbohci.sys Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`043c6000 fffff880`043d7000 usbehci usbehci.sys Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`043d7000 fffff880`043e3000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`043e3000 fffff880`043eb000 ASACPI ASACPI.sys Thu Jul 16 05: 31: 29 2009 (4A5E9F11)
fffff880`043eb000 fffff880`043f4000 wmiacpi wmiacpi.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`043f4000 fffff880`04400000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`04400000 fffff880`04452000 Rt64win7 Rt64win7.sys Tue Feb 09 04: 42: 09 2010 (4B70D991)
fffff880`04452000 fffff880`04453480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`0445a000 fffff880`045b2000 athrx athrx.sys Tue Jun 09 20: 06: 49 2009 (4A2EA4B9)
fffff880`045b2000 fffff880`045bf000 vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`045bf000 fffff880`045fd000 1394ohci 1394ohci.sys Tue Jul 14 02: 07: 12 2009 (4A5BCC30)
fffff880`04800000 fffff880`04816000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`04816000 fffff880`0483a000 rasl2tp rasl2tp.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`04841000 fffff880`053f4000 atikmdag atikmdag.sys Wed Jul 04 07: 16: 13 2012 (4FF3D19D)
fffff880`053f4000 fffff880`053ff000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`05800000 fffff880`0581d000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`05823000 fffff880`05866000 ks ks.sys Tue Jul 14 02: 00: 31 2009 (4A5BCA9F)
fffff880`05866000 fffff880`0587a000 amdiox64 amdiox64.sys Thu Feb 18 16: 17: 53 2010 (4B7D5A21)
fffff880`0587a000 fffff880`0588c000 umbus umbus.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`0588c000 fffff880`058a4000 nusb3hub nusb3hub.sys Fri Jan 22 04: 22: 18 2010 (4B5919EA)
fffff880`058a4000 fffff880`058fe000 usbhub usbhub.sys Tue Jul 14 02: 07: 09 2009 (4A5BCC2D)
fffff880`058fe000 fffff880`05913000 NDProxy NDProxy.SYS Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`05913000 fffff880`0592e000 AtihdW76 AtihdW76.sys Thu Feb 23 13: 30: 12 2012 (4F463154)
fffff880`0592e000 fffff880`0596b000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`0596b000 fffff880`0598d000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`0598d000 fffff880`05992200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`05993000 fffff880`059b0000 usbccgp usbccgp.sys Tue Jul 14 02: 06: 45 2009 (4A5BCC15)
fffff880`059b0000 fffff880`059c9000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02: 06: 21 2009 (4A5BCBFD)
fffff880`059c9000 fffff880`059d1080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`059d2000 fffff880`059e0000 kbdhid kbdhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`059e0000 fffff880`059ed000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`059ed000 fffff880`059fb000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`06e00000 fffff880`06e0e000 hidusb hidusb.sys Tue Jul 14 02: 06: 22 2009 (4A5BCBFE)
fffff880`06e16000 fffff880`06fc7000 viahduaa viahduaa.sys Tue Mar 02 12: 30: 18 2010 (4B8CF6CA)
fffff880`06fc7000 fffff880`06fd3000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`06fd3000 fffff880`06fe1000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`06fe1000 fffff880`06ffc000 USBSTOR USBSTOR.SYS Tue Jul 14 02: 06: 34 2009 (4A5BCC0A)
fffff880`07200000 fffff880`0724d000 mrxsmb10 mrxsmb10.sys Tue Jul 14 01: 24: 08 2009 (4A5BC218)
fffff880`0724d000 fffff880`07270000 mrxsmb20 mrxsmb20.sys Tue Jul 14 01: 24: 05 2009 (4A5BC215)
fffff880`07270000 fffff880`072a1000 AODDriver2 AODDriver2.sys Tue Mar 06 10: 55: 00 2012 (4F55DEF4)
fffff880`072ac000 fffff880`07374000 HTTP HTTP.sys Tue Jul 14 01: 22: 16 2009 (4A5BC1A8)
fffff880`07374000 fffff880`07392000 bowser bowser.sys Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff880`07392000 fffff880`073aa000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`073aa000 fffff880`073d6000 mrxsmb mrxsmb.sys Tue Jul 14 01: 23: 59 2009 (4A5BC20F)
fffff880`073d6000 fffff880`073e6000 epfwwfp epfwwfp.sys Thu May 14 15: 12: 55 2009 (4A0C18D7)
fffff880`0763d000 fffff880`076e3000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`076e3000 fffff880`076ee000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`076ee000 fffff880`0771b000 srvnet srvnet.sys Tue Jul 14 01: 24: 58 2009 (4A5BC24A)
fffff880`0771b000 fffff880`0772d000 tcpipreg tcpipreg.sys Tue Jul 14 02: 09: 49 2009 (4A5BCCCD)
fffff880`0772d000 fffff880`07796000 srv2 srv2.sys Tue Jul 14 01: 25: 02 2009 (4A5BC24E)
fffff880`07a1e000 fffff880`07ab6000 srv srv.sys Tue Jul 14 01: 25: 11 2009 (4A5BC257)
fffff880`07ab6000 fffff880`07ae7000 WUDFRd WUDFRd.sys Tue Jul 14 02: 06: 06 2009 (4A5BCBEE)
fffff960`00010000 fffff960`0031f000 win32k win32k.sys Tue Jul 14 01: 40: 16 2009 (4A5BC5E0)
fffff960`004e0000 fffff960`004ea000 TSDDD TSDDD.dll Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff960`00650000 fffff960`00677000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`015eb000 fffff880`015f9000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01200000 fffff880`0120c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0120c000 fffff880`01215000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`010e7000 fffff880`010fa000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 0000003B
Arguments 00000000`c0000005 fffff800`02b5e105 fffff880`075fcc90 00000000`00000000
[CPU Information]
~MHz = REG_DWORD 3010
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 16 Model 5 Stepping 3
ProcessorNameString = REG_SZ AMD Athlon(tm) II X4 640 Processor
VendorIdentifier = REG_SZ AuthenticAMD
Machine ID Information [From Smbios 2.6, DMIVersion 0, Size=2522]
BiosMajorRelease = 8
BiosMinorRelease = 15
BiosVendor = American Megatrends Inc.
BiosVersion = 0902
BiosReleaseDate = 05/19/2010
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To Be Filled By O.E.M.
SystemVersion = System Version
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASUSTeK Computer INC.
BaseBoardProduct = M4A87TD EVO
BaseBoardVersion = Rev 1.xx
sysinfo: unknown error 80004005
[SMBIOS Data Tables v2.6]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2522 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version 0902
BIOS Starting Address Segment f000
BIOS Release Date 05/19/2010
BIOS ROM Size 100000
BIOS Characteristics
04: - ISA Supported
07: - PCI Supported
09: - Plug and Play Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
14: - ESCD Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 8
BIOS Minor Revision 15
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer System manufacturer
Product Name System Product Name
Version System Version
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To Be Filled By O.E.M.
Family To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK Computer INC.
Product M4A87TD EVO
Version Rev 1.xx
Serial Number
Asset Tag
Feature Flags 09h
1491221876: - XS
1491221836: - XS
Location To Be Filled By O.E.M.
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer Chassis Manufacture
Chassis Type Desktop
Version Chassis Version
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 1
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 42 - Handle 0004h]
Socket Designation AM3
Processor Type Central Processor
Processor Family edh - Specification Reserved
Processor Manufacturer AMD
Processor ID 530f1000fffb8b17
Processor Version AMD Athlon(tm) II X4 640 Processor
Processor Voltage 8fh - 1.5V
External Clock 200MHz
Max Speed 3000MHz
Current Speed 3000MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle 0007h
Serial Number
Asset Tag Number
Part Number To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
Maximum Cache Size 0200h - 512K
Installed Size 0200h - 512K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Specification Reserved
Associativity 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
Maximum Cache Size 0800h - 2048K
Installed Size 0800h - 2048K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Specification Reserved
Associativity 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0007h]
Socket Designation L3-Cache
Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
Maximum Cache Size 0000h - 0K
Installed Size 0000h - 0K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[OEM Strings (Type 11) - Length 5 - Handle 0030h]
Number of Strings 4
1 20CF30933914
2 To Be Filled By O.E.M.
3 To Be Filled By O.E.M.
4 To Be Filled By O.E.M.
[Physical Memory Array (Type 16) - Length 15 - Handle 0033h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 16777216KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 0034h]
Starting Address 00000000h
Ending Address 004dffffh
Memory Array Handle 0033h
Partition Width 01
[Memory Device (Type 17) - Length 28 - Handle 0035h]
Physical Memory Array Handle 0033h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width 64 bits
Size [Not Populated]
Form Factor 01h - Other
Device Set [None]
Device Locator DIMM0
Bank Locator BANK0
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer Manufacturer00
Serial Number
Asset Tag Number
Part Number ModulePartNumber00
[Memory Device (Type 17) - Length 28 - Handle 0037h]
Physical Memory Array Handle 0033h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM1
Bank Locator BANK1
Memory Type 01h - Other
Type Detail 0080h - Synchronous
Speed 667MHz
Manufacturer Manufacturer01
Serial Number
Asset Tag Number
Part Number OCZ3G1333LV2G
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0038h]
Starting Address 00000000h
Ending Address 7fffffffh
Memory Device Handle 0037h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device (Type 17) - Length 28 - Handle 0039h]
Physical Memory Array Handle 0033h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width 64 bits
Size [Not Populated]
Form Factor 01h - Other
Device Set [None]
Device Locator DIMM2
Bank Locator BANK2
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer Manufacturer02
Serial Number
Asset Tag Number
Part Number ModulePartNumber02
[Memory Device (Type 17) - Length 28 - Handle 003bh]
Physical Memory Array Handle 0033h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM3
Bank Locator BANK3
Memory Type 01h - Other
Type Detail 0080h - Synchronous
Speed 667MHz
Manufacturer Manufacturer03
Serial Number
Asset Tag Number
Part Number OCZ3G1333LV2G
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ch]
Starting Address 80000000h
Ending Address ffffffffh
Memory Device Handle 003bh
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
Drugi bsod identyczny jak ten wyżej.
Trzeci inny ale mocno nawiązujący do pierwszego (jest jeden mianownik tych problemów).
Tutaj błąd wygenerował Eset (niekoniecznie jest winowajcą).
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000000be6a9, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000000b22b0, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d0c9fc to fffff80002c7d5c0
STACK_TEXT:
fffff880`07614778 fffff800`02d0c9fc : 00000000`0000004e 00000000`00000099 00000000`000be6a9 00000000`00000002 : nt!KeBugCheckEx
fffff880`07614780 fffff800`02cee400 : 00000000`00000000 fffff680`0001e9d0 00000000`00000000 fffff880`02fd3180 : nt!MiBadShareCount+0x4c
fffff880`076147c0 fffff800`02cadc01 : 00000000`00000000 fffff680`0001eaa8 fffffa80`0651eb30 fffff880`00d930c5 : nt! ? : FNODOBFM: `string'+0x314ca
fffff880`07614970 fffff800`02cbe3fa : 00000000`00000000 00000000`03d55fff fffffa80`00000000 fffffa80`0651eb30 : nt!MiDeleteVirtualAddresses+0x408
fffff880`07614b30 fffff800`02c7c813 : ffffffff`ffffffff 00000000`005ae810 00000000`005ae808 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`07614c20 00000000`76d6f89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`005ae7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d6f89a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02d0c9fc cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 503f857d
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------