Wątek zamknięty

Uciążliwy bluescreen

 
zielik23
Nowy
Liczba postów: 0
Post: #1
Bug 

Uciążliwy bluescreen


Witam,

Mam problem z jednym błędem, który uniemożliwia mi pracę na laptopie. Po zalogowaniu, po 1min wyskakuje mi bluescreen, i restartuje mi kompa, loguje się ponownie i tak w kółko..nic nie robiąc na kompie. W trybie awaryjnym jest ta sama sytuacja..no nic nie mogę zrobić, żadnego scana, przywracania systemu..( teraz piszę z innego kompa ), mam zdjęcie błędu..proszę pomoc

   
Notatka została dodana 29.03.2013 21:17. Ostatnia edycja dokonana 29.03.2013 21:17 przez Nostromo:

Popraw tytuł.

(Ten post był ostatnio modyfikowany: 29.03.2013 11:41 przez zielik23.)

29.03.2013 11:41

Znajdź wszystkie posty użytkownika
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #2

RE: Uciążliwy bluescreen


Błąd najczęściej powstaje ze względu na wadliwe działanie jakiegoś sterownika. W miniejszym stopniu jest to błąd sprzętowy ale można dla pewności przeprowadzić skanowanie pamięci ram jak i hdd.
Zrzut ekranu daje bardzo mgliste informacje dlatego należy podesłać pliki z folderu c:\windows\minidump do analizy.
Jak to zrobić - dowolną dystrybucją systemu ratunkowego livecd.

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 29.03.2013 21:29 przez thermalfake.)

29.03.2013 21:21

Znajdź wszystkie posty użytkownika
zielik23
Nowy
Liczba postów: 0
Post: #3
Bug 

RE: Uciążliwy bluescreen


Przepraszam, że tak długo, ale święta spędzałem po za domem. Przesyłam plik

http://wyslijto.pl/plik/0pz3m0gr80

Zrobiłem analizę pliku dmp i mam taki wynik..co mam robić dalej?


Kod:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\Przemek\Documents\032913-17503-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

WARNING:  Whitespace at start of path element
Symbol search path is:   SRV*c: \symbole*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7600.17207.amd64fre.win7_gdr.130104-1435
Machine Name:
Kernel base = 0xfffff800`0365b000 PsLoadedModuleList = 0xfffff800`03897e70
Debug session time:  Fri Mar 29 12: 30: 43.807 2013 (GMT+2)
System Uptime:  0 days 0: 02: 00.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}

Probably caused by :  win32k.sys ( win32k!EngFreeMem+21 )

Followup:  MachineOwner
---------

0:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1:  0000000000000021, the data following the pool block being freed is corrupt.  Typically this means the consumer (call stack ) has overrun the block.
Arg2:  fffff900c225d000, The pool pointer being freed.
Arg3:  00000000000035f0, The number of bytes allocated for the pool block.
Arg4:  000001fa000001f9, The corrupted value found following the pool block.

Debugging Details:
------------------


BUGCHECK_STR:   0x19_21

POOL_ADDRESS:  GetPointerFromAddress:  unable to read from fffff800039020e0
fffff900c225d000

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   csrss.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from fffff800037fd3cd to fffff800036ca840

STACK_TEXT:  
fffff880`08124fd8 fffff800`037fd3cd :  00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 :  nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 :  00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 :  nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc :  00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 :  win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b :  fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 :  win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 :  fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 :  win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 :  00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 :  win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b :  fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 :  win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 :  fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 :  win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 :  fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 :  win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 :  fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 :  win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc :  00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 :  win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f :  00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 :  win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 :  00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 :  win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiSystemServiceCopyEnd+0x13
00000000`0560eeb8 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  0x750d2dd9


STACK_COMMAND:   kb

FOLLOWUP_IP:  
win32k!EngFreeMem+21
fffff960`000e93d1 4883c420        add     rsp,20h

SYMBOL_STACK_INDEX:   2

SYMBOL_NAME:   win32k!EngFreeMem+21

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  win32k

IMAGE_NAME:   win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   50e64aeb

FAILURE_BUCKET_ID:   X64_0x19_21_win32k!EngFreeMem+21

BUCKET_ID:   X64_0x19_21_win32k!EngFreeMem+21

Followup:  MachineOwner
---------
Notatka została dodana 04.04.2013 15:42. Ostatnia edycja dokonana 04.04.2013 15:42 przez Zguba25:

Zastosuj się do notatki moderatora z 1. posta.

(Ten post był ostatnio modyfikowany: 02.04.2013 01:20 przez zielik23.)

02.04.2013 00:35

Znajdź wszystkie posty użytkownika
bodziulla
VIP

Liczba postów: 2.364
Post: #4

RE: Uciążliwy bluescreen


Hej,
Zrób może pierwszą czynność przeskanuj system za pomocą porządnego programu anty lub typu malware link:

http://www.dobreprogramy.pl/Malwarebytes...13117.html

ewentualnie jeżeli znasz program ComboFix?.
To pierwsza czynność, bo przypuszczam, że masz infekcję?. Dwa wgrywałeś jakiś program, bądź zmieniałeś sterownik, lub wgrywałeś program z tzw. crackiem?.
Pzdr

Jeżeli uważasz, że pomogłem kliknij POMÓGŁ. Pzdr :)

03.04.2013 11:32

Znajdź wszystkie posty użytkownika
zielik23
Nowy
Liczba postów: 0
Post: #5

RE: Uciążliwy bluescreen


wiem już co jest powodem wyświetlania się bluesreen'a

BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}
Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )

a proces, który wywala błąd

PROCESS_NAME: csrss.exe

co nie zmienia faktu, że nie mam pojęcia co robić, bo "csrss.exe" to proces systemowy, a jego usunięcie wywali mi cały system.

"bodziulla"

hm..instalowałem ostatnio McAfee Security, może to ma związek..a może fakt, że lapek jest trochę "zmulony" pomoże w rozwiązaniu mojego problemu
(Ten post był ostatnio modyfikowany: 03.04.2013 17:03 przez zielik23.)

03.04.2013 16:56

Znajdź wszystkie posty użytkownika
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #6

RE: Uciążliwy bluescreen


Po przemieleniu bsoda:

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\45\032913-17503-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7600.17207.amd64fre.win7_gdr.130104-1435
Machine Name:
Kernel base = 0xfffff800`0365b000 PsLoadedModuleList = 0xfffff800`03897e70
Debug session time:  Fri Mar 29 12: 30: 43.807 2013 (UTC + 2: 00)
System Uptime:  0 days 0: 02: 00.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}

Probably caused by :  win32k.sys ( win32k!EngFreeMem+21 )

Followup:  MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1:  0000000000000021, the data following the pool block being freed is corrupt.  Typically this means the consumer (call stack ) has overrun the block.
Arg2:  fffff900c225d000, The pool pointer being freed.
Arg3:  00000000000035f0, The number of bytes allocated for the pool block.
Arg4:  000001fa000001f9, The corrupted value found following the pool block.

Debugging Details:
------------------


BUGCHECK_STR:   0x19_21

POOL_ADDRESS:  GetPointerFromAddress:  unable to read from fffff800039020e0
fffff900c225d000

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   csrss.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from fffff800037fd3cd to fffff800036ca840

STACK_TEXT:  
fffff880`08124fd8 fffff800`037fd3cd :  00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 :  nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 :  00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 :  nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc :  00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 :  win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b :  fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 :  win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 :  fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 :  win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 :  00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 :  win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b :  fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 :  win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 :  fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 :  win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 :  fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 :  win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 :  fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 :  win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc :  00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 :  win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f :  00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 :  win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 :  00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 :  win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiSystemServiceCopyEnd+0x13
00000000`0560eeb8 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  0x750d2dd9


STACK_COMMAND:   kb

FOLLOWUP_IP:  
win32k!EngFreeMem+21
fffff960`000e93d1 4883c420        add     rsp,20h

SYMBOL_STACK_INDEX:   2

SYMBOL_NAME:   win32k!EngFreeMem+21

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  win32k

IMAGE_NAME:   win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   50e64aeb

FAILURE_BUCKET_ID:   X64_0x19_21_win32k!EngFreeMem+21

BUCKET_ID:   X64_0x19_21_win32k!EngFreeMem+21

Followup:  MachineOwner
---------

rax=000001fa000001f9 rbx=fffff8000365b000 rcx=0000000000000019
rdx=0000000000000021 rsi=00000000000035f0 rdi=fffff88003ed1cc0
rip=fffff800036ca840 rsp=fffff88008124fd8 rbp=0000000000000000
r8=fffff900c225d000  r9=00000000000035f0 r10=0000000000000800
r11=fffff88008125010 r12=0000000000000000 r13=fffff900c225d000
r14=0000000000000000 r15=0000000000000021
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000206
nt!KeBugCheckEx:
fffff800`036ca840 48894c2408      mov     qword ptr [rsp+8],rcx ss: 0018: fffff880`08124fe0=0000000000000019
Child-SP          RetAddr           :  Args to Child                                                           :  Call Site
fffff880`08124fd8 fffff800`037fd3cd :  00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 :  nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 :  00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 :  nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc :  00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 :  win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b :  fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 :  win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 :  fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 :  win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 :  00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 :  win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b :  fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 :  win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 :  fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 :  win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 :  fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 :  win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 :  fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 :  win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc :  00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 :  win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f :  00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 :  win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 :  00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 :  win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`08125c20)
00000000`0560eeb8 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  0x750d2dd9
start             end                 module name
fffff800`00bd4000 fffff800`00bde000   kdcom    kdcom.dll    Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`03612000 fffff800`0365b000   hal      hal.dll      Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff800`0365b000 fffff800`03c35000   nt       ntkrnlmp.exe Sat Jan 05 04: 18: 11 2013 (50E79B73)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00cc7000 fffff880`00d0b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 03: 29: 10 2009 (4A5BDF66)
fffff880`00d0b000 fffff880`00d1f000   PSHED    PSHED.dll    Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00d1f000 fffff880`00d7d000   CLFS     CLFS.SYS     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d7d000 fffff880`00dd9000   volmgrx  volmgrx.sys  Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e1c000   pciide   pciide.sys   Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00e1c000 fffff880`00e2c000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00e2c000 fffff880`00e46000   mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00e54000 fffff880`00f16000   Wdf01000 Wdf01000.sys Thu Jul 26 04: 25: 13 2012 (5010AA89)
fffff880`00f16000 fffff880`00f26000   WDFLDR   WDFLDR.SYS   Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00f26000 fffff880`00f7d000   ACPI     ACPI.sys     Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00f7d000 fffff880`00f86000   WMILIB   WMILIB.SYS   Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00f86000 fffff880`00f90000   msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00f90000 fffff880`00fc3000   pci      pci.sys      Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fc3000 fffff880`00fd0000   vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00fd0000 fffff880`00fe5000   partmgr  partmgr.sys  Sat Mar 17 06: 12: 46 2012 (4F641D4E)
fffff880`00fe5000 fffff880`00fee000   compbatt compbatt.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`00fee000 fffff880`00ffa000   BATTC    BATTC.SYS    Tue Jul 14 01: 31: 01 2009 (4A5BC3B5)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Jun 02 05: 19: 52 2012 (4FC98658)
fffff880`01072000 fffff880`0108c000   rassstp  rassstp.sys  Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`0108f000 fffff880`01299000   iaStor   iaStor.sys   Thu Mar 04 03: 51: 31 2010 (4B8F2033)
fffff880`01299000 fffff880`012a2000   atapi    atapi.sys    Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`012a2000 fffff880`012cc000   ataport  ataport.SYS  Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`012cc000 fffff880`012d7000   msahci   msahci.sys   Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`012d7000 fffff880`012e2000   amdxata  amdxata.sys  Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`012e2000 fffff880`0132e000   fltmgr   fltmgr.sys   Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`0132e000 fffff880`01342000   fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`01342000 fffff880`01357000   Lbd      Lbd.sys      Thu Feb 03 15: 23: 53 2011 (4D4ABA79)
fffff880`01357000 fffff880`01360000   lullaby  lullaby.sys  Thu Jun 18 04: 45: 32 2009 (4A39AA4C)
fffff880`01360000 fffff880`013be000   msrpc    msrpc.sys    Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`013be000 fffff880`013ed000   ndiswan  ndiswan.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`01412000 fffff880`015b4000   Ntfs     Ntfs.sys     Fri Aug 31 17: 13: 11 2012 (5040D487)
fffff880`015b4000 fffff880`015ce000   ksecdd   ksecdd.sys   Sat Jun 02 04: 47: 00 2012 (4FC97EA4)
fffff880`015ce000 fffff880`015df000   pcw      pcw.sys      Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`015df000 fffff880`015e9000   Fs_Rec   Fs_Rec.sys   Thu Mar 01 04: 54: 36 2012 (4F4EF2FC)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Sat Jun 02 05: 20: 48 2012 (4FC98690)
fffff880`0168b000 fffff880`016d4000   fwpkclnt fwpkclnt.sys Fri Jan 04 04: 00: 34 2013 (50E645D2)
fffff880`016e6000 fffff880`017d8000   ndis     ndis.sys     Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`017d8000 fffff880`017f9000   raspptp  raspptp.sys  Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`01801000 fffff880`019fe000   tcpip    tcpip.sys    Fri Jan 04 04: 03: 34 2013 (50E64686)
fffff880`01a00000 fffff880`01a26000   pacer    pacer.sys    Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`01a26000 fffff880`01a35000   netbios  netbios.sys  Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`01a35000 fffff880`01a50000   wanarp   wanarp.sys   Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`01a50000 fffff880`01a6d000   tmtdi    tmtdi.sys    Wed Jul 15 11: 35: 55 2009 (4A5DA2FB)
fffff880`01a6d000 fffff880`01a81000   termdd   termdd.sys   Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`01a81000 fffff880`01a9c000   raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`01aa4000 fffff880`01af0000   volsnap  volsnap.sys  Thu Sep 06 16: 55: 02 2012 (5048B946)
fffff880`01af0000 fffff880`01af8000   spldr    spldr.sys    Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01af8000 fffff880`01b32000   rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`01b32000 fffff880`01b44000   mup      mup.sys      Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01b44000 fffff880`01b4d000   hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01b4d000 fffff880`01b87000   fvevol   fvevol.sys   Sat Sep 26 04: 34: 26 2009 (4ABD7DB2)
fffff880`01b87000 fffff880`01b9d000   disk     disk.sys     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01b9d000 fffff880`01bcd000   CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01bdb000 fffff880`01bff000   rasl2tp  rasl2tp.sys  Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`02a00000 fffff880`02a0a000   vwifimp  vwifimp.sys  Tue Jul 14 02: 07: 28 2009 (4A5BCC40)
fffff880`02a10000 fffff880`02bf8000   vsapint  vsapint.sys  Fri Jul 30 11: 23: 32 2010 (4C529A14)
fffff880`02bf8000 fffff880`02c00000   ASMMAP64 ASMMAP64.sys Thu Jul 02 11: 13: 26 2009 (4A4C7A36)
fffff880`02e00000 fffff880`02e0d000   vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`02e0d000 fffff880`02e34000   jmcr     jmcr.sys     Tue Aug 18 10: 23: 06 2009 (4A8A64EA)
fffff880`02e34000 fffff880`02e63000   SCSIPORT SCSIPORT.SYS Tue Jul 14 02: 01: 04 2009 (4A5BCAC0)
fffff880`02e63000 fffff880`02e6b000   kbfiltr  kbfiltr.sys  Mon Jul 20 11: 21: 42 2009 (4A643726)
fffff880`02e6b000 fffff880`02e6f500   CmBatt   CmBatt.sys   Tue Jul 14 01: 31: 03 2009 (4A5BC3B7)
fffff880`02e70000 fffff880`02ff9000   athrx    athrx.sys    Wed Mar 03 01: 45: 21 2010 (4B8DB121)
fffff880`02ff9000 fffff880`02ffa480   swenum   swenum.sys   Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`04000000 fffff880`04089000   afd      afd.sys      Wed Dec 28 04: 59: 08 2011 (4EFA940C)
fffff880`04089000 fffff880`0409f000   vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`0409f000 fffff880`04256800   snp2uvc  snp2uvc.sys  Thu Aug 20 04: 41: 36 2009 (4A8CB7E0)
fffff880`042c6000 fffff880`042f0000   cdrom    cdrom.sys    Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`042f0000 fffff880`042f9000   Null     Null.SYS     Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`042f9000 fffff880`04300000   Beep     Beep.SYS     Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`04300000 fffff880`0430e000   vga      vga.sys      Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`0430e000 fffff880`04333000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`04333000 fffff880`04343000   watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`04343000 fffff880`0434c000   RDPCDD   RDPCDD.sys   Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`0434c000 fffff880`04355000   rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04355000 fffff880`0435e000   rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`0435e000 fffff880`04369000   Msfs     Msfs.SYS     Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`04369000 fffff880`0437a000   Npfs     Npfs.SYS     Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0437a000 fffff880`04398000   tdx      tdx.sys      Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`04398000 fffff880`043a5000   TDI      TDI.SYS      Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`043a5000 fffff880`043ea000   netbt    netbt.sys    Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`043ea000 fffff880`043f3000   wfplwf   wfplwf.sys   Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`04600000 fffff880`04656000   USBPORT  USBPORT.SYS  Fri Mar 25 04: 23: 03 2011 (4D8C0A97)
fffff880`04656000 fffff880`04674000   i8042prt i8042prt.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`04674000 fffff880`04699000   ETD      ETD.sys      Mon Jan 18 13: 37: 56 2010 (4B545624)
fffff880`04699000 fffff880`046a8000   kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`046a8000 fffff880`046be000   intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`046be000 fffff880`046ce000   CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`046ce000 fffff880`046e4000   AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`046e4000 fffff880`046f0000   ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`046fd000 fffff880`0474e000   rdbss    rdbss.sys    Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`0474e000 fffff880`0475a000   nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`0475a000 fffff880`04765000   mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`04765000 fffff880`04774000   discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`04774000 fffff880`04792000   dfsc     dfsc.sys     Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`04792000 fffff880`047a3000   blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`047a3000 fffff880`047c9000   tunnel   tunnel.sys   Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`047c9000 fffff880`047f5000   atikmpag atikmpag.sys Fri Jan 22 14: 07: 54 2010 (4B59A32A)
fffff880`04a05000 fffff880`05049000   atipmdag atipmdag.sys Fri Jan 22 14: 46: 46 2010 (4B59AC46)
fffff880`05049000 fffff880`0513d000   dxgkrnl  dxgkrnl.sys  Wed Jan 26 05: 22: 56 2011 (4D3FA1A0)
fffff880`0513d000 fffff880`05183000   dxgmms1  dxgmms1.sys  Wed Jan 26 05: 22: 12 2011 (4D3FA174)
fffff880`05183000 fffff880`051a7000   HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`051a7000 fffff880`051b8000   HECIx64  HECIx64.sys  Thu Sep 17 21: 54: 16 2009 (4AB293E8)
fffff880`051b8000 fffff880`051c9000   usbehci  usbehci.sys  Fri Mar 25 04: 22: 57 2011 (4D8C0A91)
fffff880`051c9000 fffff880`051e8000   JME      JME.sys      Thu Feb 25 04: 26: 53 2010 (4B85EDFD)
fffff880`051e8000 fffff880`051f7000   mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`051f7000 fffff880`051ff000   ATK64AMD ATK64AMD.sys Wed May 13 03: 04: 54 2009 (4A0A1CB6)
fffff880`05200000 fffff880`0524e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 08: 52: 28 2010 (4B88CF3C)
fffff880`05270000 fffff880`052b3000   ks       ks.sys       Thu Mar 04 05: 32: 25 2010 (4B8F37D9)
fffff880`052b3000 fffff880`052c5000   umbus    umbus.sys    Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`052c5000 fffff880`0531f000   usbhub   usbhub.sys   Fri Mar 25 04: 23: 22 2011 (4D8C0AAA)
fffff880`0531f000 fffff880`05334000   NDProxy  NDProxy.SYS  Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`05334000 fffff880`05355000   AtiHdmi  AtiHdmi.sys  Wed Sep 30 15: 54: 46 2009 (4AC36326)
fffff880`05355000 fffff880`05392000   portcls  portcls.sys  Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`05392000 fffff880`053b4000   drmk     drmk.sys     Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`053b4000 fffff880`053b9200   ksthunk  ksthunk.sys  Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`05412000 fffff880`054c3000   CHDRT64  CHDRT64.sys  Fri Oct 30 18: 50: 02 2009 (4AEB274A)
fffff880`054c3000 fffff880`054e0000   usbccgp  usbccgp.sys  Fri Mar 25 04: 23: 03 2011 (4D8C0A97)
fffff880`054e0000 fffff880`054e1f00   USBD     USBD.SYS     Fri Mar 25 04: 22: 51 2011 (4D8C0A8B)
fffff880`054e2000 fffff880`054f2d00   STREAM   STREAM.SYS   Tue Jul 14 02: 06: 18 2009 (4A5BCBFA)
fffff880`054f3000 fffff880`054fba80   sncduvc  sncduvc.SYS  Mon Dec 29 10: 14: 26 2008 (495894F2)
fffff880`054fc000 fffff880`05508000   Dxapi    Dxapi.sys    Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`05508000 fffff880`05516000   crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`05516000 fffff880`055de000   HTTP     HTTP.sys     Tue Jul 14 01: 22: 16 2009 (4A5BC1A8)
fffff880`05800000 fffff880`05818000   mpsdrv   mpsdrv.sys   Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`05818000 fffff880`05845000   mrxsmb   mrxsmb.sys   Sat Feb 27 08: 52: 19 2010 (4B88CF33)
fffff880`05845000 fffff880`05868000   mrxsmb20 mrxsmb20.sys Sat Feb 27 08: 52: 26 2010 (4B88CF3A)
fffff880`05891000 fffff880`05a9b000   dump_iaStor dump_iaStor.sys Thu Mar 04 03: 51: 31 2010 (4B8F2033)
fffff880`05a9b000 fffff880`05aae000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`05aae000 fffff880`05abc000   monitor  monitor.sys  Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`05abc000 fffff880`05adf000   luafv    luafv.sys    Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`05adf000 fffff880`05aee000   tmpreflt tmpreflt.sys Fri Jul 30 11: 30: 01 2010 (4C529B99)
fffff880`05aee000 fffff880`05b4d000   tmxpflt  tmxpflt.sys  Fri Jul 30 11: 30: 07 2010 (4C529B9F)
fffff880`05b4d000 fffff880`05b62000   lltdio   lltdio.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`05b62000 fffff880`05bb5000   nwifi    nwifi.sys    Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`05bb5000 fffff880`05bc8000   ndisuio  ndisuio.sys  Tue Jul 14 02: 09: 25 2009 (4A5BCCB5)
fffff880`05bc8000 fffff880`05be0000   rspndr   rspndr.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`05be0000 fffff880`05bfe000   bowser   bowser.sys   Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff880`05c00000 fffff880`05c67000   srv2     srv2.sys     Fri Aug 27 05: 37: 46 2010 (4C77330A)
fffff880`05cb6000 fffff880`05d5c000   peauth   peauth.sys   Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`05d5c000 fffff880`05d67000   secdrv   secdrv.SYS   Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`05d67000 fffff880`05d94000   srvnet   srvnet.sys   Fri Aug 27 05: 37: 24 2010 (4C7732F4)
fffff880`05d94000 fffff880`05da6000   tcpipreg tcpipreg.sys Tue Jul 14 02: 09: 49 2009 (4A5BCCCD)
fffff880`060c5000 fffff880`0615b000   srv      srv.sys      Fri Aug 27 05: 38: 00 2010 (4C773318)
fffff880`0615b000 fffff880`06191000   fastfat  fastfat.SYS  Tue Jul 14 01: 23: 28 2009 (4A5BC1F0)
fffff960`000d0000 fffff960`003e6000   win32k   win32k.sys   Fri Jan 04 04: 22: 19 2013 (50E64AEB)
fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      Wed Jan 26 07: 31: 34 2011 (4D3FBFC6)
fffff960`00890000 fffff960`008f1000   ATMFD    ATMFD.DLL    Sun Dec 16 15: 40: 45 2012 (50CDDD6D)

Unloaded modules:
fffff880`01bcd000 fffff880`01bdb000   crashdmp.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000E000
fffff880`040a9000 fffff880`042b3000   dump_iaStor.
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0020A000
fffff880`042b3000 fffff880`042c6000   dump_dumpfve
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00013000
Bugcheck code 00000019
Arguments 00000000`00000021 fffff900`c225d000 00000000`000035f0 000001fa`000001f9
[CPU Information]
~MHz = REG_DWORD 2394
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 37 Stepping 5
ProcessorNameString = REG_SZ Intel(R) Core(TM) i3 CPU       M 370  @ 2.40GHz
Update Signature = REG_BINARY 0,0,0,0,1,0,0,0
Update Status = REG_DWORD 2
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 100000000
Machine ID Information [From Smbios 2.6, DMIVersion 38, Size=2771]
BiosMajorRelease = 4
BiosMinorRelease = 6
BiosVendor = American Megatrends Inc.
BiosVersion = K52JB.205
BiosReleaseDate = 05/12/2010
SystemManufacturer = ASUSTeK Computer Inc.        
SystemProductName = K52JB
SystemFamily =                      
SystemVersion = 1.0      
SystemSKU =                      
BaseBoardManufacturer = ASUSTeK Computer Inc.        
BaseBoardProduct = K52JB
BaseBoardVersion = 1.0      
CPUID:         "Intel(R) Core(TM) i3 CPU       M 370  @ 2.40GHz"
MaxSpeed:      2400
CurrentSpeed:  2394
[SMBIOS Data Tables v2.6]
[DMI Version - 38]
[2.0 Calling Convention - No]
[Table Size - 2771 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]
  Vendor                        American Megatrends Inc.
  BIOS Version                  K52JB.205
  BIOS Starting Address Segment f000
  BIOS Release Date             05/12/2010
  BIOS ROM Size                 200000
  BIOS Characteristics
       07:  - PCI Supported
       11:  - Upgradeable FLASH BIOS
       12:  - BIOS Shadowing Supported
       15:  - CD-Boot Supported
       16:  - Selectable Boot Supported
       19:  - EDD Supported
       23:  - 1.2MB Floppy Supported
       24:  - 720KB Floppy Supported
       25:  - 2.88MB Floppy Supported
       26:  - Print Screen Device Supported
       27:  - Keyboard Services Supported
       28:  - Serial Services Supported
       29:  - Printer Services Supported
       32:  - BIOS Vendor Reserved
       34:  - BIOS Vendor Reserved
  BIOS Characteristic Extensions
       00:  - ACPI Supported
       01:  - USB Legacy Supported
       07:  - Smart Battery Supported
       08:  - BIOS Boot Specification Supported
       10:  - Specification Reserved
  BIOS Major Revision           4
  BIOS Minor Revision           6
  EC Firmware Major Revision    255
  EC Firmware Minor Revision    255
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  Manufacturer                  ASUSTeK Computer Inc.        
  Product                       K52JB
  Version                       1.0      
  Serial Number                                    
  Asset Tag                                        
  Feature Flags                 09h
       264322420:  - y    
       264322380:  - y    
  Location                      MIDDLE              
  Chassis Handle                0003h
  Board Type                    0ah - Processor/Memory Module
  Number of Child Handles       0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
  Manufacturer                  ASUSTeK Computer Inc.        
  Chassis Type                  Notebook
                                Lock Present
  Version                       1.0      
  Serial Number                                    
  Asset Tag Number                                  
  Bootup State                  Safe
  Power Supply State            Safe
  Thermal State                 Safe
  Security Status               None
  OEM Defined                   0
  Height                        0U
  Number of Power Cords         1
  Number of Contained Elements  0
  Contained Element Size        0
[Processor Information (Type 4) - Length 42 - Handle 0004h]
  Socket Designation            Socket 989
  Processor Type                Central Processor
  Processor Family              bfh - Specification Reserved
  Processor Manufacturer        Intel            
  Processor ID                  55060200fffbebbf
  Processor Version             Intel(R) Core(TM) i3 CPU       M 370  @ 2.40GH
  Processor Voltage             80h - 0.0V
  External Clock                133MHz
  Max Speed                     4000MHz
  Current Speed                 2399MHz
  Status                        Enabled Populated
  Processor Upgrade             Other
  L1 Cache Handle               0005h
  L2 Cache Handle               0006h
  L3 Cache Handle               0007h
  Serial Number                                      
  Asset Tag Number                                    
  Part Number                   To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
  Socket Designation            L1-Cache
  Cache Configuration           0180h - WB Enabled Int NonSocketed L1
  Maximum Cache Size            0020h - 32K
  Installed Size                0020h - 32K
  Supported SRAM Type           0001h - Other
  Current SRAM Type             0001h - Other
  Cache Speed                   0ns
  Error Correction Type         None
  System Cache Type             Unified
  Associativity                 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
  Socket Designation            L2-Cache
  Cache Configuration           0281h - Varies Enabled Int NonSocketed L2
  Maximum Cache Size            0100h - 256K
  Installed Size                0100h - 256K
  Supported SRAM Type           0001h - Other
  Current SRAM Type             0001h - Other
  Cache Speed                   0ns
  Error Correction Type         None
  System Cache Type             Unified
  Associativity                 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0007h]
  Socket Designation            L3-Cache
  Cache Configuration           0282h - Varies Enabled Int NonSocketed L3
  Maximum Cache Size            0c00h - 3072K
  Installed Size                0c00h - 3072K
  Supported SRAM Type           0001h - Other
  Current SRAM Type             0001h - Other
  Cache Speed                   0ns
  Error Correction Type         None
  System Cache Type             Unified
  Associativity                 Other
[Onboard Devices Information (Type 10) - Length 6 - Handle 003bh]
  Number of Devices             1
  01:  Type                      Video [disabled]
  01:  Description                  To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 003ch]
  Number of Devices             1
  01:  Type                      Ethernet [disabled]
  01:  Description               To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 003dh]
  Number of Devices             1
  01:  Type                      Other [enabled]
  01:  Description                  Onboard 1394
[OEM Strings (Type 11) - Length 5 - Handle 003eh]
  Number of Strings             1
   1                                        
[System Configuration Options (Type 12) - Length 5 - Handle 003fh]
[System Information (Type 1) - Length 27 - Handle 0001h]
  Manufacturer                  ASUSTeK Computer Inc.        
  Product Name                  K52JB
  Version                       1.0      
  Serial Number                                    
  UUID                          00000000-0000-0000-0000-000000000000
  Wakeup Type                   Power Switch
  SKUNumber                                          
  Family                                              
[Physical Memory Array (Type 16) - Length 15 - Handle 0041h]
  Location                      03h - SystemBoard/Motherboard
  Use                           03h - System Memory
  Memory Error Correction       03h - None
  Maximum Capacity              16777216KB
  Memory Error Inf Handle       [Not Provided]
  Number of Memory Devices      4
[Memory Device (Type 17) - Length 28 - Handle 0042h]
  Physical Memory Array Handle  0041h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          2048MB
  Form Factor                   0dh - SODIMM
  Device Set                    [None]
  Device Locator                DIMM0
  Bank Locator                  BANK 0
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         1067MHz
  Manufacturer                  04CB
  Serial Number                        
  Asset Tag Number                    
  Part Number                   AD73I1B1672EG    
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0043h]
  Starting Address              00000000h
  Ending Address                001fffffh
  Memory Device Handle          0042h
  Mem Array Mapped Adr Handle   004bh
  Partition Row Position        [Unknown]
  Interleave Position           01
  Interleave Data Depth         01
[Memory Device (Type 17) - Length 28 - Handle 0044h]
  Physical Memory Array Handle  0041h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM1
  Bank Locator                  BANK 1
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [Empty]
  Serial Number                        
  Asset Tag Number                    
  Part Number                   [Empty]
[Memory Device (Type 17) - Length 28 - Handle 0045h]
  Physical Memory Array Handle  0041h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          1024MB
  Form Factor                   0dh - SODIMM
  Device Set                    [None]
  Device Locator                DIMM2
  Bank Locator                  BANK 2
  Memory Type                   18h - Specification Reserved
  Type Detail                   0080h - Synchronous
  Speed                         1067MHz
  Manufacturer                  06C1
  Serial Number                        
  Asset Tag Number                    
  Part Number                   SSY3128M8-EDJED  
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0046h]
  Starting Address              00000000h
  Ending Address                000fffffh
  Memory Device Handle          0045h
  Mem Array Mapped Adr Handle   004bh
  Partition Row Position        [Unknown]
  Interleave Position           02
  Interleave Data Depth         01
[Memory Device (Type 17) - Length 28 - Handle 004ah]
  Physical Memory Array Handle  0041h
  Memory Error Info Handle      [Not Provided]
  Total Width                   0 bits
  Data Width                    0 bits
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM3
  Bank Locator                  BANK 3
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  [Empty]
  Serial Number                        
  Asset Tag Number                    
  Part Number                   [Empty]
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 004bh]
  Starting Address              00000000h
  Ending Address                002fffffh
  Memory Array Handle           0041h
  Partition Width               04

0:  kd> !pool fffff900c225d000
Pool page fffff900c225d000 region is Unknown
GetUlongFromAddress:  unable to read from fffff800038701b0
fffff900c225d000 is not a valid small pool allocation, checking large pool...
unable to get pool big page table - either wrong symbols or pool tagging is disabled
fffff900c225d000 is freed (or corrupt) pool
Bad previous allocation size @fffff900c225d000, last size was 0

***
*** An error (or corruption) in the pool was detected;
*** Pool Region unknown (0xFFFFF900C225D000)
***
*** Use !poolval fffff900c225d000 for more details.
***

0:  kd> !poolval fffff900c225d000
Pool page fffff900c225d000 region is Unknown

Validating Pool headers for pool page:  fffff900c225d000

Pool page [ fffff900c225d000 ] is __inVALID.

Analyzing linked list...
[ fffff900c225d000 ]:  invalid previous size [ 0x28 ] should be [ 0x0 ]


Scanning for single bit errors...

None found

Moja wiedza nie jest dorównująca niektórym guru z zagranicznych serwisów chrupających takie problemy na śniadanie czy gości z tytułem MVP posiadających wiedzę w tej dziedzinie IT.
Zresztą w przeciągu tak krótkiego czasu do momentu pokazania bsoda i tak nic nie zrobisz więc radziłby, po prostu przywrócić fabryczny system w tym Asusie.

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.

03.04.2013 20:19

Znajdź wszystkie posty użytkownika
Wątek zamknięty

Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
W koszu Błąd BCCode:3b i bluescreen mazo88 1 443 03.03.2016 18:01
Ostatni post: thermalfake
W koszu Bluescreen 0x00000124 Win7 64bit po formacie Xylos 1 478 27.01.2016 02:06
Ostatni post: thermalfake
W koszu Bluescreen 0x0000004a lokikoki14 0 573 18.01.2016 13:58
Ostatni post: lokikoki14
W koszu Bluescreen Bluescreeny 1 755 01.01.2016 02:32
Ostatni post: thermalfake
W koszu Format Win 7 bluescreen koxig 2 593 29.11.2015 20:06
Ostatni post: thermalfake
W koszu BAD_SYSTEM_CONFIG_INFO 0x00000074 Bluescreen podczas uruchamiania Win7. koxig 0 414 02.10.2015 19:09
Ostatni post: koxig
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.