Antywirusa nie mam na razie żadnego.
Ok, wyłączyłem Windows defender i zaporę systemu Windows ( msconfig).
Myślisz ze to coś da?
Dodaje jeszcze BSOD z dziś.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Windows\Minidump\120110-23415-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03006000 PsLoadedModuleList = 0xfffff800`03243e50
Debug session time: Wed Dec 1 14: 45: 48.204 2010 (UTC + 1: 00)
System Uptime: 0 days 2: 14: 50.765
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {e8, 2, 0, fffff8800470c411}
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+b7411 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000e8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800470c411, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ae0e0
00000000000000e8
CURRENT_IRQL: 2
FAULTING_IP:
athrx+b7411
fffff880`0470c411 0fb64868 movzx ecx,byte ptr [rax+68h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002820690 -- (.trap 0xfffff88002820690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000080 rbx=0000000000000000 rcx=0000000000000648
rdx=0000000000015efc rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800470c411 rsp=fffff88002820820 rbp=0000000000000000
r8=fffffa8006fe2000 r9=0000000000000000 r10=fffff88003163180
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
athrx+0xb7411:
fffff880`0470c411 0fb64868 movzx ecx,byte ptr [rax+68h] ds: ca00: 00000000`000000e8=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003075ca9 to fffff80003076740
STACK_TEXT:
fffff880`02820548 fffff800`03075ca9 : 00000000`0000000a 00000000`000000e8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02820550 fffff800`03074920 : 00000000`00000000 fffffa80`06f251a0 fffff880`01a37610 fffffa80`07b2c820 : nt!KiBugCheckDispatch+0x69
fffff880`02820690 fffff880`0470c411 : 00000000`00000000 fffff880`030e9250 fffffa80`07119ca0 fffffa80`06f251a0 : nt!KiPageFault+0x260
fffff880`02820820 00000000`00000000 : fffff880`030e9250 fffffa80`07119ca0 fffffa80`06f251a0 00000000`00000001 : athrx+0xb7411
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+b7411
fffff880`0470c411 0fb64868 movzx ecx,byte ptr [rax+68h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrx+b7411
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c105fdf
FAILURE_BUCKET_ID: X64_0xD1_athrx+b7411
BUCKET_ID: X64_0xD1_athrx+b7411
Followup: MachineOwner
---------
2: kd> lmvm athrx
start end module name
fffff880`04655000 fffff880`047e0000 athrx T (no symbols)
Loaded symbol image file: athrx.sys
Image path: \SystemRoot\system32\DRIVERS\athrx.sys
Image name: athrx.sys
Timestamp: Thu Jun 10 05: 45: 35 2010 (4C105FDF)
CheckSum: 00194CCE
ImageSize: 0018B000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4