BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 26.12.2012 16:41
Komputer:
System: Windows 7 Home Premium 64 bit
Karta graficzna: ATI Radeon 4800 Series
Procesor: Intel Core 2 quad Q8200 2.33 GHz
Witam!
Od jakiegoś czasu mam dość poważny problem z komputerem, ponieważ dosyć często pojawiają się crash'e i blue screen'y których kody podałem powyżej. Najczęściej pojawiają się podczas włączenia przeglądarki, albo po jakimś czasie od uruchomienia komputera. Po kilku takich crash'ach i restartach już jest w miarę normalnie, ale problem wraca ciągle po ponownym uruchomieniu komputera np. jak wyłączę komputer i włączę na następny dzień to znowu zmagam się z blue screen'ami, przejdą i znowu od początku. Często przy restarcie po blue screen'ie komputer strasznie wolno się włączał, lub jak chciałem go wyłączyć, to w ogóle się nie wyłączał, zatrzymywał się na "Trwa zamykanie systemu windows". Po uruchomieniu prawie zawsze tez jest problem z dostępem do internetu, wygląda to tak jakby karta sieciowa się zawieszała. Nie można włączyć/ wyłączyć "Połączenia sieci bezprzewodowej". Szukałem jakiś rozwiązań tego problemu ale nigdzie nie znalazłem niczego konkretnego, nie wiem czym są spowodowane te crash'e i miałem problemy ze sprawdzeniem co je powoduje i jak zrobić, żeby ich nie było, dlatego zwracam się do was z prośbą, żebyście mi pomogli w miarę możliwości. Z góry dzięki. Jak będą potrzebne jakieś pliki lub dodatkowe informacje to będę mógł je załączyć.
RE: Błędy BSOD 0x0000001e, 0x0..7e, 0x0..3b, 0x0..24 - thermalfake - 26.12.2012 20:22
c:\windows\minidump
Spakuj wszystkie i udostępnij do przejrzenia.
Plik systemowego dziennika zdarzeń też nie zaszkodzi opublikować (dowolny serwer hostingowy bo plik nie jest mały).
c:\Windows\System32\winevt\Logs\system.evtx
RE: Błędy BSOD 0x0000001e, 0x0..7e, 0x0..3b, 0x0..24 - Mariuszw13 - 26.12.2012 22:38
Tu są wszystkie pliki: http://www.sendspace.com/file/gdd5w4
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - thermalfake - 27.12.2012 16:58
NTFS_FILE_SYSTEM
Błąd oznaczający problem ze sterownikiem ntfs.sys, obsługującym system plików NTFS. Prawdopodobną przyczyną wystąpienia tego błędu jest uszkodzenie kontrolera lub nawet samego dysku twardego (bad sectors), czasem jest to spowodowane uszkodzeniem lub zerwaniem kabla sygnałowego w taśmie łączącej dysk z płytą główną.
Do wykonania w wierszu poleceń
chkdsk /f/r (naprawia system plikowy i jednocześnie próbuje odzyskać dane z uszkodzonych sektorów.
Trzeba także wykonać diagnostykę dysku w postaci przeskanowania powierzchni i sprawdzenia smart'a.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff8800b13d088, fffff8800b13c8e0, fffff80002c9ad6c}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+b4 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800b13d088
Arg3: fffff8800b13c8e0
Arg4: fffff80002c9ad6c
Debugging Details:
------------------
EXCEPTION_RECORD: fffff8800b13d088 -- (.exr 0xfffff8800b13d088)
ExceptionAddress: fffff80002c9ad6c (nt!IoGetRelatedDeviceObject+0x000000000000000c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800b13c8e0 -- (.cxr 0xfffff8800b13c8e0)
rax=fee58da388efc5fe rbx=0000000000000000 rcx=fffffa80041789d0
rdx=fffffa80041789d0 rsi=0000000000000000 rdi=fffffa80041789d0
rip=fffff80002c9ad6c rsp=fffff8800b13d2c8 rbp=fffffa8004159b10
r8=000000000000000f r9=fffff880009e8100 r10=0000000000000000
r11=0000000000000000 r12=fffff8800b13d300 r13=fffffa80041789d0
r14=fffffa8003dc3000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!IoGetRelatedDeviceObject+0xc:
fffff800`02c9ad6c 488b4008 mov rax,qword ptr [rax+8] ds: 002b: fee58da3`88efc606=?
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb7100
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFlushUserStream+b4
fffff880`012da6f4 389c24a0000000 cmp byte ptr [rsp+0A0h],bl
FAULTING_IP:
nt!IoGetRelatedDeviceObject+c
fffff800`02c9ad6c 488b4008 mov rax,qword ptr [rax+8]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80002f59b90 to fffff80002c9ad6c
STACK_TEXT:
fffff880`0b13d2c8 fffff800`02f59b90 : 00000000`00000000 00000000`0000000e fffffa80`00000000 00001f80`01000000 : nt!IoGetRelatedDeviceObject+0xc
fffff880`0b13d2d0 fffff800`02cc97a7 : fffff880`0b13d768 fffff880`0b13d700 fffffa80`04159b10 00000000`00000000 : nt!FsRtlAcquireFileForCcFlushEx+0x3c
fffff880`0b13d570 fffff800`02cc8d3c : 00000000`00000000 fffff980`0333c100 00000000`00000000 fffff880`0130c28a : nt!MmFlushSection+0x1c3
fffff880`0b13d630 fffff880`012da6f4 : fffffa80`05faff68 00000000`00000000 fffff8a0`00000000 00000000`00000001 : nt!CcFlushCache+0x7bc
fffff880`0b13d730 fffff880`012d04e3 : 00000000`00000000 fffff8a0`09220c70 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0xb4
fffff880`0b13d7b0 fffff880`012d8fc9 : fffffa80`03c2c810 fffffa80`0479a180 00000000`00120101 00000000`00000000 : Ntfs!NtfsFlushVolume+0x2c7
fffff880`0b13d8e0 fffff880`012d96d0 : fffffa80`03c2c810 fffffa80`03d39c10 fffffa80`03e7ff20 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`0b13d9c0 fffff880`01108bcf : fffffa80`03d39fb0 fffffa80`03d39c10 fffffa80`03c2c810 fffff880`0b13d9e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`0b13da30 fffff880`011076df : fffffa80`04615be0 00000000`00000000 fffffa80`04615b00 fffffa80`03d39c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0b13dac0 fffff800`02f8bdfb : 00000000`00000002 fffffa80`03e7ff20 00000000`00000000 fffffa80`03d39c10 : fltmgr!FltpDispatch+0xcf
fffff880`0b13db20 fffff800`02f209f1 : fffffa80`03d39c10 fffffa80`03dc3060 fffffa80`03e7ff20 fffff800`02dfae80 : nt!IopSynchronousServiceTail+0xfb
fffff880`0b13db90 fffff800`02c87253 : fffffa80`03dc3060 00000000`ff222270 fffffa80`04615be0 fffffa80`03e7ff20 : nt!NtFlushBuffersFile+0x171
fffff880`0b13dc20 00000000`77aa17ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0380f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77aa17ca
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsFlushUserStream+b4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5040d4c6
STACK_COMMAND: .cxr 0xfffff8800b13c8e0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+b4
BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+b4
Followup: MachineOwner
---------
1: kd> .cxr fffff8800b13c8e0
rax=fee58da388efc5fe rbx=0000000000000000 rcx=fffffa80041789d0
rdx=fffffa80041789d0 rsi=0000000000000000 rdi=fffffa80041789d0
rip=fffff80002c9ad6c rsp=fffff8800b13d2c8 rbp=fffffa8004159b10
r8=000000000000000f r9=fffff880009e8100 r10=0000000000000000
r11=0000000000000000 r12=fffff8800b13d300 r13=fffffa80041789d0
r14=fffffa8003dc3000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!IoGetRelatedDeviceObject+0xc:
fffff800`02c9ad6c 488b4008 mov rax,qword ptr [rax+8] ds: 002b: fee58da3`88efc606=?
1: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
RetAddr : Args to Child : Call Site
fffff800`02f59b90 : 00000000`00000000 00000000`0000000e fffffa80`00000000 00001f80`01000000 : nt!IoGetRelatedDeviceObject+0xc
fffff800`02cc97a7 : fffff880`0b13d768 fffff880`0b13d700 fffffa80`04159b10 00000000`00000000 : nt!FsRtlAcquireFileForCcFlushEx+0x3c
fffff800`02cc8d3c : 00000000`00000000 fffff980`0333c100 00000000`00000000 fffff880`0130c28a : nt!MmFlushSection+0x1c3
fffff880`012da6f4 : fffffa80`05faff68 00000000`00000000 fffff8a0`00000000 00000000`00000001 : nt!CcFlushCache+0x7bc
fffff880`012d04e3 : 00000000`00000000 fffff8a0`09220c70 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0xb4
fffff880`012d8fc9 : fffffa80`03c2c810 fffffa80`0479a180 00000000`00120101 00000000`00000000 : Ntfs!NtfsFlushVolume+0x2c7
fffff880`012d96d0 : fffffa80`03c2c810 fffffa80`03d39c10 fffffa80`03e7ff20 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x459
fffff880`01108bcf : fffffa80`03d39fb0 fffffa80`03d39c10 fffffa80`03c2c810 fffff880`0b13d9e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`011076df : fffffa80`04615be0 00000000`00000000 fffffa80`04615b00 fffffa80`03d39c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff800`02f8bdfb : 00000000`00000002 fffffa80`03e7ff20 00000000`00000000 fffffa80`03d39c10 : fltmgr!FltpDispatch+0xcf
fffff800`02f209f1 : fffffa80`03d39c10 fffffa80`03dc3060 fffffa80`03e7ff20 fffff800`02dfae80 : nt!IopSynchronousServiceTail+0xfb
fffff800`02c87253 : fffffa80`03dc3060 00000000`ff222270 fffffa80`04615be0 fffffa80`03e7ff20 : nt!NtFlushBuffersFile+0x171
00000000`77aa17ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77aa17ca
W tym wypadku do usunięcia programy takie jak AV, Daemon Tools (widzę obecność jego sterownika), programy do tunelowania VPN, Hamachi itp. Przed tym zrób sobie kopię zapasową lub chociaż punkt przywracania.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002f7aa71, fffff8800ac25160, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+51 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f7aa71, Address of the instruction which caused the bugcheck
Arg3: fffff8800ac25160, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`02f7aa71 4883bba800000000 cmp qword ptr [rbx+0A8h],0
CONTEXT: fffff8800ac25160 -- (.cxr 0xfffff8800ac25160)
rax=00000000000000c1 rbx=0000000000000000 rcx=fffff8a003225ae0
rdx=fffff8a00722abb0 rsi=fffffa8005891b50 rdi=fffff8a00722abb0
rip=fffff80002f7aa71 rsp=fffff8800ac25b40 rbp=fffffa8004d28810
r8=fffffa8004d28810 r9=00000000000012ec r10=00000000000012ec
r11=00000000002f2570 r12=fffffa80050e8960 r13=fffffa8004d28810
r14=000007fffff56000 r15=fffff8a003225ae0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObpCloseHandleTableEntry+0x51:
fffff800`02f7aa71 4883bba800000000 cmp qword ptr [rbx+0A8h],0 ds: 002b: 00000000`000000a8=?
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f7b094 to fffff80002f7aa71
STACK_TEXT:
fffff880`0ac25b40 fffff800`02f7b094 : 00000000`000012ec fffffa80`04d28810 fffff8a0`03225ae0 00000000`000012ec : nt!ObpCloseHandleTableEntry+0x51
fffff880`0ac25bd0 fffff800`02c87253 : fffffa80`05891b50 fffff880`0ac25ca0 000007fe`fd230000 fffffa80`059117e0 : nt!ObpCloseHandle+0x94
fffff880`0ac25c20 00000000`778d140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04d3f868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778d140a
FOLLOWUP_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`02f7aa71 4883bba800000000 cmp qword ptr [rbx+0A8h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpCloseHandleTableEntry+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 503f82be
STACK_COMMAND: .cxr 0xfffff8800ac25160 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+51
BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+51
Followup: MachineOwner
---------
rax=fffff8800ac249a0 rbx=fffff80002dcf638 rcx=000000000000003b
rdx=00000000c0000005 rsi=fffff80002c09000 rdi=0000000000000000
rip=fffff80002c87fc0 rsp=fffff8800ac24898 rbp=0000000000000000
r8=fffff80002f7aa71 r9=fffff8800ac25160 r10=0000000000000000
r11=fffff8800ac24a98 r12=fffff80002c87253 r13=fffff80002e8de94
r14=fffff80002c86e40 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000286
nt!KeBugCheckEx:
fffff800`02c87fc0 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff880`0ac248a0=000000000000003b
Child-SP RetAddr : Args to Child : Call Site
fffff880`0ac24898 fffff800`02c87569 : 00000000`0000003b 00000000`c0000005 fffff800`02f7aa71 fffff880`0ac25160 : nt!KeBugCheckEx
fffff880`0ac248a0 fffff800`02c86ebc : fffffa80`050bdc80 fffff880`01564110 00000000`00000000 fffffa80`050a9c80 : nt!KiBugCheckDispatch+0x69
fffff880`0ac249e0 fffff800`02cb2aed : fffff800`02ea27e0 fffff800`02dc6814 fffff800`02c09000 fffff880`0ac25908 : nt!KiSystemServiceHandler+0x7c
fffff880`0ac24a20 fffff800`02cb18c5 : fffff800`02dcf638 fffff880`0ac24a98 fffff880`0ac25908 fffff800`02c09000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0ac24a50 fffff800`02cc2851 : fffff880`0ac25908 fffff880`0ac25160 fffff880`00000000 fffff8a0`0722abb0 : nt!RtlDispatchException+0x415
fffff880`0ac25130 fffff800`02c87642 : fffff880`0ac25908 00000000`00000000 fffff880`0ac259b0 fffffa80`05891b50 : nt!KiDispatchException+0x135
fffff880`0ac257d0 fffff800`02c861ba : 00000000`00000000 00000000`000000a8 00000002`e34b5800 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0ac259b0 fffff800`02f7aa71 : fffffa80`04d28810 00000000`00000000 fffffa80`05891b50 00000000`00000000 : nt!KiPageFault+0x23a (TrapFrame @ fffff880`0ac259b0)
fffff880`0ac25b40 fffff800`02f7b094 : 00000000`000012ec fffffa80`04d28810 fffff8a0`03225ae0 00000000`000012ec : nt!ObpCloseHandleTableEntry+0x51
fffff880`0ac25bd0 fffff800`02c87253 : fffffa80`05891b50 fffff880`0ac25ca0 000007fe`fd230000 fffffa80`059117e0 : nt!ObpCloseHandle+0x94
fffff880`0ac25c20 00000000`778d140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0ac25c20)
00000000`04d3f868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778d140a
start end module name
fffff800`00ba0000 fffff800`00baa000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff800`02c09000 fffff800`031f1000 nt ntkrnlmp.exe Thu Aug 30 17: 11: 58 2012 (503F82BE)
fffff800`031f1000 fffff800`0323a000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`00c00000 fffff880`00c26000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`00c26000 fffff880`00c4a000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`00c51000 fffff880`00ca0000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`00ca0000 fffff880`00cb4000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00cb4000 fffff880`00d12000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d12000 fffff880`00dd2000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`00dd2000 fffff880`00df4000 tdx tdx.sys Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`00e00000 fffff880`00e16000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`00e16000 fffff880`00ed8000 Wdf01000 Wdf01000.sys Thu Jul 26 04: 25: 13 2012 (5010AA89)
fffff880`00ed8000 fffff880`00ee8000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00ee8000 fffff880`00f3f000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`00f3f000 fffff880`00f48000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00f48000 fffff880`00f52000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00f52000 fffff880`00f85000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00f85000 fffff880`00f92000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00f92000 fffff880`00fa7000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00fa7000 fffff880`00fbc000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00fbc000 fffff880`00fe1000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`00fe1000 fffff880`00fee000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`00fee000 fffff880`00fff000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`0105e000 fffff880`010a7000 dtsoftbus01 dtsoftbus01.sys Fri Jan 13 14: 45: 46 2012 (4F10358A)
fffff880`010a7000 fffff880`010b2000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`010ba000 fffff880`01116000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`01116000 fffff880`0111d000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`0111d000 fffff880`0112d000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0112d000 fffff880`01147000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`01147000 fffff880`01150000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01150000 fffff880`0117a000 ataport ataport.SYS Sat Nov 20 10: 19: 15 2010 (4CE79293)
fffff880`0117a000 fffff880`01185000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`01185000 fffff880`011d1000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`011d1000 fffff880`011e5000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`011e5000 fffff880`011f6000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`01200000 fffff880`0121b000 ksecdd ksecdd.sys Sat Jun 02 04: 50: 23 2012 (4FC97F6F)
fffff880`0121b000 fffff880`01245000 ksecpkg ksecpkg.sys Sat Jun 02 05: 27: 11 2012 (4FC9880F)
fffff880`01245000 fffff880`0124e000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01251000 fffff880`013f4000 Ntfs Ntfs.sys Fri Aug 31 17: 14: 14 2012 (5040D4C6)
fffff880`013f4000 fffff880`013fd000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Wed Aug 22 17: 11: 28 2012 (5034F6A0)
fffff880`01460000 fffff880`01470000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`01474000 fffff880`014e6000 cng cng.sys Sat Jun 02 05: 25: 51 2012 (4FC987BF)
fffff880`014e6000 fffff880`014f7000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`014f7000 fffff880`01501000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01501000 fffff880`015f3000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`015f3000 fffff880`015fc000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01600000 fffff880`0162a000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`01630000 fffff880`01831000 tcpip tcpip.sys Wed Oct 03 17: 09: 34 2012 (506C552E)
fffff880`01831000 fffff880`0187b000 fwpkclnt fwpkclnt.sys Wed Aug 22 17: 10: 49 2012 (5034F679)
fffff880`0187b000 fffff880`018c7000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`018c7000 fffff880`018cf000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`018cf000 fffff880`01909000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`01909000 fffff880`0191b000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`0191b000 fffff880`01924000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`01924000 fffff880`0195e000 fvevol fvevol.sys Sat Nov 20 10: 24: 06 2010 (4CE793B6)
fffff880`0195e000 fffff880`01974000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01974000 fffff880`019a4000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`019a4000 fffff880`019c7000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`019da000 fffff880`019e3000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`019e3000 fffff880`019ea000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`019ea000 fffff880`019f8000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`03800000 fffff880`0382d000 mrxsmb mrxsmb.sys Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`03863000 fffff880`03878000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`03878000 fffff880`038cb000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`038cb000 fffff880`038de000 ndisuio ndisuio.sys Sat Nov 20 11: 50: 08 2010 (4CE7A7E0)
fffff880`038de000 fffff880`038f6000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`038f6000 fffff880`039bf000 HTTP HTTP.sys Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`039bf000 fffff880`039dd000 bowser bowser.sys Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff880`039dd000 fffff880`039f5000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`06a00000 fffff880`06a51000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`06a51000 fffff880`06a5d000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`06a5d000 fffff880`06a68000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`06a69000 fffff880`06af2000 afd afd.sys Wed Dec 28 04: 59: 20 2011 (4EFA9418)
fffff880`06af2000 fffff880`06b37000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`06b37000 fffff880`06b42000 ws2ifsl ws2ifsl.sys Tue Jul 14 02: 10: 33 2009 (4A5BCCF9)
fffff880`06b42000 fffff880`06b4b000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b4b000 fffff880`06b71000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`06b71000 fffff880`06b80000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b80000 fffff880`06b9d000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06b9d000 fffff880`06bb8000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`06bb8000 fffff880`06bcc000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff880`06bcc000 fffff880`06bdb000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`06bdb000 fffff880`06bf9000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`06c00000 fffff880`06c1d000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06c1d000 fffff880`06c3b000 i8042prt i8042prt.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`06c3b000 fffff880`06c4a000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06c4a000 fffff880`06c5a000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`06c5a000 fffff880`06c70000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`06c76000 fffff880`06cd0000 atikmpag atikmpag.sys Thu May 24 21: 54: 34 2012 (4FBE91FA)
fffff880`06cd0000 fffff880`06dc4000 dxgkrnl dxgkrnl.sys Sat Nov 20 10: 50: 50 2010 (4CE799FA)
fffff880`06dc4000 fffff880`06df6000 Rt64win7 Rt64win7.sys Thu Feb 26 10: 04: 13 2009 (49A65B0D)
fffff880`06e00000 fffff880`06e1b000 AtihdW76 AtihdW76.sys Thu Feb 23 13: 30: 12 2012 (4F463154)
fffff880`06e1b000 fffff880`06e58000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`06e58000 fffff880`06e7a000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`06e7a000 fffff880`06e7f200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`06e8b000 fffff880`06eba000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`06eba000 fffff880`06ed5000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`06ed5000 fffff880`06ef6000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`06ef6000 fffff880`06f10000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`06f10000 fffff880`06f1b000 hamachi hamachi.sys Thu Feb 19 11: 36: 41 2009 (499D3639)
fffff880`06f1b000 fffff880`06f2a000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06f2a000 fffff880`06f2b480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`06f2c000 fffff880`06f6f000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`06f6f000 fffff880`06f81000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`06f81000 fffff880`06fdb000 usbhub usbhub.sys Fri Mar 25 04: 29: 25 2011 (4D8C0C15)
fffff880`06fdb000 fffff880`06fe6000 flpydisk flpydisk.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`06fe6000 fffff880`06ffb000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`07200000 fffff880`07256000 USBPORT USBPORT.SYS Fri Mar 25 04: 29: 12 2011 (4D8C0C08)
fffff880`07256000 fffff880`07267000 usbehci usbehci.sys Fri Mar 25 04: 29: 04 2011 (4D8C0C00)
fffff880`07267000 fffff880`07274000 fdc fdc.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`07275000 fffff880`07d70000 atikmdag atikmdag.sys Thu May 24 22: 31: 32 2012 (4FBE9AA4)
fffff880`07d70000 fffff880`07db6000 dxgmms1 dxgmms1.sys Sat Nov 20 10: 49: 53 2010 (4CE799C1)
fffff880`07db6000 fffff880`07dda000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`07dda000 fffff880`07de7000 usbuhci usbuhci.sys Fri Mar 25 04: 29: 03 2011 (4D8C0BFF)
fffff880`07de7000 fffff880`07df3000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`07df3000 fffff880`07dff000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`07e32000 fffff880`07e80000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`07e80000 fffff880`07ea4000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`07ea4000 fffff880`07f4a000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`07f4a000 fffff880`07f55000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`07f55000 fffff880`07f86000 srvnet srvnet.sys Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`07f86000 fffff880`07f98000 tcpipreg tcpipreg.sys Wed Oct 03 18: 07: 26 2012 (506C62BE)
fffff880`07f98000 fffff880`07fce000 fastfat fastfat.SYS Tue Jul 14 01: 23: 28 2009 (4A5BC1F0)
fffff880`08a00000 fffff880`08a19000 HIDCLASS HIDCLASS.SYS Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`08a19000 fffff880`08a21080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`08a22000 fffff880`08a2f000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`08a2f000 fffff880`08a3d000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`08a3d000 fffff880`08a49000 dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`08a49000 fffff880`08a52000 dump_atapi dump_atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`08a52000 fffff880`08a65000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`08a65000 fffff880`08ac1000 HdAudio HdAudio.sys Sat Nov 20 11: 44: 23 2010 (4CE7A687)
fffff880`08ac1000 fffff880`08b16000 udfs udfs.sys Sat Nov 20 10: 26: 11 2010 (4CE79433)
fffff880`08b16000 fffff880`08b22000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`08bb3000 fffff880`08bb4f00 USBD USBD.SYS Fri Mar 25 04: 28: 59 2011 (4D8C0BFB)
fffff880`08bb5000 fffff880`08bc3000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`08bc3000 fffff880`08be0000 usbccgp usbccgp.sys Fri Mar 25 04: 29: 14 2011 (4D8C0C0A)
fffff880`08be0000 fffff880`08bee000 hidusb hidusb.sys Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`0a000000 fffff880`0a091000 athrxusb athrxusb.sys Fri Dec 22 13: 05: 49 2006 (458BCA1D)
fffff880`0a091000 fffff880`0a09b000 mbam mbam.sys Tue Mar 20 17: 04: 48 2012 (4F68AAA0)
fffff880`0a09b000 fffff880`0a0a6000 asyncmac asyncmac.sys Tue Jul 14 02: 10: 13 2009 (4A5BCCE5)
fffff880`0a0b2000 fffff880`0a11b000 srv2 srv2.sys Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`0a11b000 fffff880`0a1b3000 srv srv.sys Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`0a1b3000 fffff880`0a1d0000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff960`000a0000 fffff960`003b6000 win32k win32k.sys Thu Nov 22 04: 26: 12 2012 (50AD9B54)
fffff960`00550000 fffff960`0055a000 TSDDD TSDDD.dll Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff960`00650000 fffff960`00677000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`08b22000 fffff880`08b93000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0a000000 fffff880`0a091000 athrxusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00091000
fffff880`08b22000 fffff880`08bb3000 athrxusb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00091000
fffff880`019a4000 fffff880`019b2000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`019b2000 fffff880`019be000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`019be000 fffff880`019c7000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`019c7000 fffff880`019da000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 0000003B
Arguments 00000000`c0000005 fffff800`02f7aa71 fffff880`0ac25160 00000000`00000000
[CPU Information]
~MHz = REG_DWORD 2333
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 23 Stepping 7
ProcessorNameString = REG_SZ Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz
Update Signature = REG_BINARY 0,0,0,0,5,7,0,0
Update Status = REG_DWORD 6
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 70500000000
Machine ID Information [From Smbios 2.4, DMIVersion 36, Size=1187]
BiosVendor = Award Software International, Inc.
BiosVersion = F10
BiosReleaseDate = 06/07/2010
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = EP45T-UD3LR
SystemFamily =
SystemVersion =
SystemSKU =
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = EP45T-UD3LR
BaseBoardVersion = x.x
CPUID: "Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz"
MaxSpeed: 2330
CurrentSpeed: 2333
[SMBIOS Data Tables v2.4]
[DMI Version - 36]
[2.0 Calling Convention - No]
[Table Size - 1187 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor Award Software International, Inc.
BIOS Version F10
BIOS Starting Address Segment e000
BIOS Release Date 06/07/2010
BIOS ROM Size 100000
BIOS Characteristics
07: - PCI Supported
09: - Plug and Play Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
19: - EDD Supported
22: - 360KB Floppy Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 255
BIOS Minor Revision 255
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer Gigabyte Technology Co., Ltd.
Product Name EP45T-UD3LR
Version
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber
Family
[BaseBoard Information (Type 2) - Length 8 - Handle 0002h]
Manufacturer Gigabyte Technology Co., Ltd.
Product EP45T-UD3LR
Version x.x
Serial Number
[System Enclosure (Type 3) - Length 17 - Handle 0003h]
Manufacturer Gigabyte Technology Co., Ltd.
Chassis Type Desktop
Version
Serial Number
Asset Tag Number
Bootup State Unknown
Power Supply State Unknown
Thermal State Unknown
Security Status Unknown
OEM Defined 0
[Processor Information (Type 4) - Length 35 - Handle 0004h]
Socket Designation Socket 775
Processor Type Central Processor
Processor Family 01h - Other
Processor Manufacturer Intel
Processor ID 77060100fffbebbf
Processor Version Intel(R) Core(TM)2 Quad CPU
Processor Voltage 8ah - 1.0V
External Clock 333MHz
Max Speed 4000MHz
Current Speed 2333MHz
Status Enabled Populated
Processor Upgrade Socket 478
L1 Cache Handle 000ah
L2 Cache Handle 000bh
L3 Cache Handle [Not Present]
Serial Number
Asset Tag Number
Part Number
[Memory Controller Information (Type 5) - Length 24 - Handle 0005h]
Error Detecting Method 04h - 8-bit Parity
Error Correcting Capability 04h - None
Supported Interleave 03h - One Way Interleave
Current Interleave 03h - One Way Interleave
Maximum Memory Module Size 0ah - 1024MB
Supported Speeds 0001h - Other
Supported Memory Types 0001h - Other
Memory Module Voltage 5V
Number of Memory Slots 4
Memory Slot Handle 0006h
Memory Slot Handle 0007h
Memory Slot Handle 0008h
Memory Slot Handle 0009h
Enabled Err Correcting Caps 04h - None
[Memory Module Information (Type 6) - Length 12 - Handle 0006h]
Socket Designation A0
Bank Connections 1fh - 1
Current Speed 31ns
Current Memory Type 0001h - Other
Installed Size 0bh - 2048 [single bank]
Enabled Size 0bh - 2048 [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0007h]
Socket Designation A1
Bank Connections 2fh - 2
Current Speed 47ns
Current Memory Type 0001h - Other
Installed Size 0bh - 2048 [single bank]
Enabled Size 0bh - 2048 [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0008h]
Socket Designation A2
Bank Connections 3fh - 3
Current Speed 63ns
Current Memory Type 0002h - Unknown
Installed Size 7fh - [Not Installed] [single bank]
Enabled Size 7fh - [Not Installed] [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0009h]
Socket Designation A3
Bank Connections 4fh - 4
Current Speed 79ns
Current Memory Type 0002h - Unknown
Installed Size 7fh - [Not Installed] [single bank]
Enabled Size 7fh - [Not Installed] [single bank]
Error Status 00h - [No Errors]
[Cache Information (Type 7) - Length 19 - Handle 000ah]
Socket Designation Internal Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0040h - 64K
Installed Size 0040h - 64K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Cache Information (Type 7) - Length 19 - Handle 000bh]
Socket Designation External Cache
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 0800h - 2048K
Installed Size 0800h - 2048K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Physical Memory Array (Type 16) - Length 15 - Handle 0019h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 33554432KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Device (Type 17) - Length 27 - Handle 001ah]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width 2304 bits
Data Width 2244 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator A0
Bank Locator Bank0/1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 400MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001bh]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width 2304 bits
Data Width 2244 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator A1
Bank Locator Bank2/3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 400MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001ch]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width [Unknown]
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator A2
Bank Locator Bank4/5
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001dh]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width [Unknown]
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator A3
Bank Locator Bank6/7
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 001eh]
Starting Address 00000000h
Ending Address 003fffffh
Memory Array Handle 0019h
Partition Width 01
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 001fh]
Starting Address 00000000h
Ending Address 001fffffh
Memory Device Handle 001ah
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0020h]
Starting Address 00200000h
Ending Address 003fffffh
Memory Device Handle 001bh
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0021h]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 001ch
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0022h]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 001dh
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : nwifi.sys ( nwifi!Pt6Receive+296 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Operacja uko czona pomy lnie.
FAULTING_IP:
+58ad2faf0371dc10
00000000`00000000 ? ?
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f22798 -- (.exr 0xfffff88002f22798)
ExceptionAddress: fffff880014b84da (ndis!NdisFIndicateReceiveNetBufferLists+0x000000000000004a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f22840 -- (.trap 0xfffff88002f22840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004238960
rdx=fffffa8006073660 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014b84da rsp=fffff88002f229d0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=fffff88003e8e180
r11=fffffa8006073660 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!NdisFIndicateReceiveNetBufferLists+0x4a:
fffff880`014b84da ff9340020000 call qword ptr [rbx+240h] ds: 00000000`00000240=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c959be to fffff80002c9df90
STACK_TEXT:
fffff880`02f21878 fffff800`02c959be : fffffa80`058e0030 fffffa80`055032d8 fffff880`02f21ff0 fffff800`02cc8e20 : nt!KeBugCheck
fffff880`02f21880 fffff800`02cc8aed : fffff800`02ea46f8 fffff800`02de11b0 fffff800`02c1f000 fffff880`02f22798 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f218b0 fffff800`02cc78c5 : fffff800`02de4ed8 fffff880`02f21928 fffff880`02f22798 fffff800`02c1f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f218e0 fffff800`02cd8851 : fffff880`02f22798 fffff880`02f21ff0 fffff880`00000000 fffffa80`06073660 : nt!RtlDispatchException+0x415
fffff880`02f21fc0 fffff800`02c9d642 : fffff880`02f22798 fffffa80`04238960 fffff880`02f22840 00000000`00000001 : nt!KiDispatchException+0x135
fffff880`02f22660 fffff800`02c9bf4a : fffffa80`036c0270 00000000`00000000 00000000`00000007 fffffa80`04019048 : nt!KiExceptionDispatch+0xc2
fffff880`02f22840 fffff880`014b84da : fffff880`03e8e5c0 fffffa80`04204010 fffffa80`05b93020 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f229d0 fffff880`03e577ee : fffffa80`04204010 00000000`00000000 fffffa80`06073660 fffff880`03e8e5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x4a
fffff880`02f22a10 fffff880`014d10a7 : fffffa80`056611a0 fffffa80`05d6fdf0 00000000`00000001 0000000f`04d4eba8 : nwifi!Pt6Receive+0x296
fffff880`02f22a70 fffff880`0a0d5c40 : fffffa80`045464db 00000000`00000000 00000000`00000000 fffffa80`04176d00 : ndis! ? : FNODOBFM: `string'+0xcd8f
fffff880`02f22ac0 fffffa80`045464db : 00000000`00000000 00000000`00000000 fffffa80`04176d00 fffffa80`00000001 : athrxusb+0xec40
fffff880`02f22ac8 00000000`00000000 : 00000000`00000000 fffffa80`04176d00 fffffa80`00000001 00000000`00000000 : 0xfffffa80`045464db
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Pt6Receive+296
fffff880`03e577ee 83a3e010000000 and dword ptr [rbx+10E0h],0
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: nwifi!Pt6Receive+296
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_nwifi!Pt6Receive+296
BUCKET_ID: X64_0x1E_0_nwifi!Pt6Receive+296
Followup: MachineOwner
---------
Reszta na potem bo tego jest sporo.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 28.12.2012 15:43
Usunąłem już te programy, zrobiłem chkdsk i sprawdziłem dysk twardy programem HD Tune, nie znalazł żadnych błędów. Screen poniżej:
[attachment=5006]
Co do połączenia z płytą główną to wydaje mi się że te problemy zaczęły się od wymiany płyty głównej właśnie, bo poprzednia mi się spaliła, dałem do wymiany i chyba od wtedy pojawiają się blue screen'y. Formaty nie pomogły.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - thermalfake - 30.12.2012 00:54
Tylko zauważ, że najpierw zrobiłeś chkdsk.
Diagnostyka dysku tu jest nędzna. Nie pokazałeś parametrów SMART, ani tu na zrzucie nie ma porządnie wykonanego skanu tzn nie wiem w jakich wartościach czasu mieszczą się czasy dostępu do sektorów w ms.To, ze ta strona ma kolor zielony nie zawsze oznacza sprawny dysk.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 30.12.2012 13:12
Kod:
HD Tune: SAMSUNG HD642JJ Health
ID Current Worst ThresholdData Status
(01) Raw Read Error Rate 100 100 51 0 Ok
(03) Spin Up Time 86 86 11 5220 Ok
(04) Start/Stop Count 97 97 0 2583 Ok
(05) Reallocated Sector Count 100 100 10 0 Ok
(07) Seek Error Rate 100 100 51 0 Ok
(08) Seek Time Performance 100 100 15 0 Ok
(09) Power On Hours Count 98 98 0 12377 Ok
(0A) Spin Retry Count 100 100 51 0 Ok
(0B) Calibration Retry Count 100 100 0 0 Ok
(0C) Power Cycle Count 98 98 0 2256 Ok
(0D) Soft Read Error Rate 100 100 0 0 Ok
(B7) (unknown attribute) 100 100 0 0 Ok
(B8) (unknown attribute) 100 100 0 0 Ok
(BB) (unknown attribute) 100 100 0 0 Ok
(BC) (unknown attribute) 100 100 0 0 Ok
(BE) Airflow Temperature 78 47 0 370081814 Ok
(C2) Temperature 75 45 0 437190681 Ok
(C3) Hardware ECC Recovered 100 100 0 609353 Ok
(C4) Reallocated Event Count 100 100 0 0 Ok
(C5) Current Pending Sector 100 100 0 0 Ok
(C6) Offline Uncorrectable 100 100 0 0 Ok
(C7) Ultra DMA CRC Error Count 100 100 0 0 Ok
(C8) Write Error Rate 100 100 0 0 Ok
(C9) TA Counter Detected 253 253 0 0 Ok
Power On Time : 12377
Health Status : Ok
Tu są jeszcze dodatkowe informacje z tego programu.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 24.11.2013 12:20
Na początku chciałbym przeprosić za double posta i odkopywanie, ale dalej mam ten sam problem, chociaż już BSOD'y pojawiają się rzadziej, średnio gdzieś 2 razy dziennie. Nie ma już problemów z siecią albo długim uruchamianiem.
Po uruchomieniu komputera w trybie awaryjnym z obsługą sieci też komputer się zawiesił.
W miarę możliwości zrobiłem wszystkie aktualizacje sterowników, BIOS'u itp itd. Zrobiłem defragmentacje dysku.
Jak na razie BSOD'y pojawiają się prawie zawsze po włączeniu przeglądarki albo podczas grania.
Załączam zawartość folderu minidump i proszę o pomoc.
http://speedy.sh/gBGxd/Minidump.rar
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - bqb - 24.11.2013 21:50
Czyli pojawiają się w wyniku obciążenia - albo coś się przegrzewa, albo zasilacz już nie daje rady. Musisz to sprawdzić. Zwłaszcza, że spaliła Ci się płyta główna - jak się spaliła? Od czego?
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 24.11.2013 22:20
Po zainstalowaniu nowych sterowników, ustawiły one inne wartości taktowania karty graficznej i wentylatora i wszystko zaczęło się grzać. Słabo się na tym znam więc ciężko mi napisać jasne wytłumaczenie. Teraz już pilnuje temperatur i wszystko pod tym względem jest w porządku.
Po tym jak BSOD wystąpi i zrestartuje kompa już przez resztę dnia jest spokój i normalnie wszystko działa, Dopiero jak na następny dzień go włączę to znowu Blue Screen. Dlatego raczej się nic nie przegrzewa.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - bqb - 24.11.2013 23:52
W takim wypadku wygląda to na zasilacz, lub na spuchnięte kondensatory na płycie głównej.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 29.11.2013 18:39
Oddałem komputer do naprawy i u nich wszystko było w porządku, po sprawdzeniu wszystkiego wszystko działa jak należy dopóki nie podłacze adaptera wi-fi ( sagem wi-fi adapter 802.11 XG-760N od liveboxa). Crashe prawdopodobnie powoduje nwifi.sys. czy wie ktoś jak naprawić ten problem? Ciężko by mi było podłączyć kabel więc ta opcje raczej nie wchodzi w gre.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - thermalfake - 29.11.2013 21:22
Jaki livebox taki adapter. Sterowniki robione na prędce do Win 7 dla tego starucha. Wypier**lił bym to przez okno. Kup sobie porządnego dongla usb, moduł z odkręcaną anteną albo kartę pci.
RE: BSOD: prośba o analizę przyczyn błędów o różnych kodach - Mariuszw13 - 30.11.2013 13:24
Problem został rozwiązany, wystarczyło przeinstalować sterowniki od adaptera wifi. Już się rozglądam za jakimś nowszym żeby ograniczyć możliwość wystąpienia problemu i poprawić zasięg bo na tym jest dość kiepski, więc w niedalekiej przyszłości będzie coś lepszego. Wielkie dzięki thermalfake i bqb za pomoc.
Temat można już zamknąć.
BSOD: prośba o analizę przyczyn błędów o różnych kodach (rozwiązany) - LadyInBlue - 30.11.2013 15:21
Wątek rozwiązany.
|