Uciążliwy bluescreen
|
zielik23
Nowy
Liczba postów: 0
|
Uciążliwy bluescreen
Witam,
Mam problem z jednym błędem, który uniemożliwia mi pracę na laptopie. Po zalogowaniu, po 1min wyskakuje mi bluescreen, i restartuje mi kompa, loguje się ponownie i tak w kółko..nic nie robiąc na kompie. W trybie awaryjnym jest ta sama sytuacja..no nic nie mogę zrobić, żadnego scana, przywracania systemu..( teraz piszę z innego kompa ), mam zdjęcie błędu..proszę pomoc
Notatka została dodana 29.03.2013 21:17 . Ostatnia edycja dokonana 29.03.2013 21:17 przez Nostromo:
Popraw tytuł.
(Ten post był ostatnio modyfikowany: 29.03.2013 11:41 przez zielik23.)
29.03.2013 11:41
|
Podziękowania od: |
|
|
thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Uciążliwy bluescreen
Błąd najczęściej powstaje ze względu na wadliwe działanie jakiegoś sterownika. W miniejszym stopniu jest to błąd sprzętowy ale można dla pewności przeprowadzić skanowanie pamięci ram jak i hdd.
Zrzut ekranu daje bardzo mgliste informacje dlatego należy podesłać pliki z folderu c:\windows\minidump do analizy.
Jak to zrobić - dowolną dystrybucją systemu ratunkowego livecd.
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 29.03.2013 21:29 przez thermalfake.)
29.03.2013 21:21
|
Podziękowania od: |
|
|
zielik23
Nowy
Liczba postów: 0
|
RE: Uciążliwy bluescreen
Przepraszam, że tak długo, ale święta spędzałem po za domem. Przesyłam plik
http://wyslijto.pl/plik/0pz3m0gr80
Zrobiłem analizę pliku dmp i mam taki wynik..co mam robić dalej?
Kod:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\Przemek\Documents\032913-17503-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
Symbol search path is: SRV*c: \symbole*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.17207.amd64fre.win7_gdr.130104-1435
Machine Name:
Kernel base = 0xfffff800`0365b000 PsLoadedModuleList = 0xfffff800`03897e70
Debug session time: Fri Mar 29 12: 30: 43.807 2013 (GMT+2)
System Uptime: 0 days 0: 02: 00.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}
Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000021, the data following the pool block being freed is corrupt. Typically this means the consumer (call stack ) has overrun the block.
Arg2: fffff900c225d000, The pool pointer being freed.
Arg3: 00000000000035f0, The number of bytes allocated for the pool block.
Arg4: 000001fa000001f9, The corrupted value found following the pool block.
Debugging Details:
------------------
BUGCHECK_STR: 0x19_21
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800039020e0
fffff900c225d000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800037fd3cd to fffff800036ca840
STACK_TEXT:
fffff880`08124fd8 fffff800`037fd3cd : 00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 : nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 : 00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 : nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc : 00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 : win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b : fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 : fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 : win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 : 00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 : win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b : fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 : win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 : fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 : fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 : win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 : fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 : win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc : 00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 : win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f : 00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 : win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 : 00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 : win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0560eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750d2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngFreeMem+21
fffff960`000e93d1 4883c420 add rsp,20h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!EngFreeMem+21
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50e64aeb
FAILURE_BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
Followup: MachineOwner
---------
Notatka została dodana 04.04.2013 15:42 . Ostatnia edycja dokonana 04.04.2013 15:42 przez Zguba25:
Zastosuj się do notatki moderatora z 1. posta.
(Ten post był ostatnio modyfikowany: 02.04.2013 01:20 przez zielik23.)
02.04.2013 00:35
|
Podziękowania od: |
|
|
bodziulla
VIP
Liczba postów: 2.364
|
RE: Uciążliwy bluescreen
Hej,
Zrób może pierwszą czynność przeskanuj system za pomocą porządnego programu anty lub typu malware link:
http://www.dobreprogramy.pl/Malwarebytes...13117.html
ewentualnie jeżeli znasz program ComboFix?.
To pierwsza czynność, bo przypuszczam, że masz infekcję?. Dwa wgrywałeś jakiś program, bądź zmieniałeś sterownik, lub wgrywałeś program z tzw. crackiem?.
Pzdr
Jeżeli uważasz, że pomogłem kliknij POMÓGŁ. Pzdr :)
|
Podziękowania od: |
|
|
zielik23
Nowy
Liczba postów: 0
|
RE: Uciążliwy bluescreen
wiem już co jest powodem wyświetlania się bluesreen'a
BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}
Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
a proces, który wywala błąd
PROCESS_NAME: csrss.exe
co nie zmienia faktu, że nie mam pojęcia co robić, bo "csrss.exe" to proces systemowy, a jego usunięcie wywali mi cały system.
"bodziulla"
hm..instalowałem ostatnio McAfee Security, może to ma związek..a może fakt, że lapek jest trochę "zmulony" pomoże w rozwiązaniu mojego problemu
(Ten post był ostatnio modyfikowany: 03.04.2013 17:03 przez zielik23.)
03.04.2013 16:56
|
Podziękowania od: |
|
|
thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Uciążliwy bluescreen
Po przemieleniu bsoda:
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\45\032913-17503-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.17207.amd64fre.win7_gdr.130104-1435
Machine Name:
Kernel base = 0xfffff800`0365b000 PsLoadedModuleList = 0xfffff800`03897e70
Debug session time: Fri Mar 29 12: 30: 43.807 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 02: 00.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}
Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000021, the data following the pool block being freed is corrupt. Typically this means the consumer (call stack ) has overrun the block.
Arg2: fffff900c225d000, The pool pointer being freed.
Arg3: 00000000000035f0, The number of bytes allocated for the pool block.
Arg4: 000001fa000001f9, The corrupted value found following the pool block.
Debugging Details:
------------------
BUGCHECK_STR: 0x19_21
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800039020e0
fffff900c225d000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800037fd3cd to fffff800036ca840
STACK_TEXT:
fffff880`08124fd8 fffff800`037fd3cd : 00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 : nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 : 00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 : nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc : 00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 : win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b : fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 : fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 : win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 : 00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 : win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b : fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 : win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 : fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 : fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 : win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 : fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 : win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc : 00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 : win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f : 00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 : win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 : 00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 : win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0560eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750d2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngFreeMem+21
fffff960`000e93d1 4883c420 add rsp,20h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!EngFreeMem+21
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50e64aeb
FAILURE_BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
Followup: MachineOwner
---------
rax=000001fa000001f9 rbx=fffff8000365b000 rcx=0000000000000019
rdx=0000000000000021 rsi=00000000000035f0 rdi=fffff88003ed1cc0
rip=fffff800036ca840 rsp=fffff88008124fd8 rbp=0000000000000000
r8=fffff900c225d000 r9=00000000000035f0 r10=0000000000000800
r11=fffff88008125010 r12=0000000000000000 r13=fffff900c225d000
r14=0000000000000000 r15=0000000000000021
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000206
nt!KeBugCheckEx:
fffff800`036ca840 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff880`08124fe0=0000000000000019
Child-SP RetAddr : Args to Child : Call Site
fffff880`08124fd8 fffff800`037fd3cd : 00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 : nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 : 00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 : nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc : 00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 : win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b : fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 : fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 : win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 : 00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 : win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b : fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 : win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 : fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 : fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 : win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 : fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 : win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc : 00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 : win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f : 00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 : win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 : 00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 : win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`08125c20)
00000000`0560eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750d2dd9
start end module name
fffff800`00bd4000 fffff800`00bde000 kdcom kdcom.dll Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`03612000 fffff800`0365b000 hal hal.dll Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff800`0365b000 fffff800`03c35000 nt ntkrnlmp.exe Sat Jan 05 04: 18: 11 2013 (50E79B73)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00cc7000 fffff880`00d0b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 03: 29: 10 2009 (4A5BDF66)
fffff880`00d0b000 fffff880`00d1f000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00d1f000 fffff880`00d7d000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d7d000 fffff880`00dd9000 volmgrx volmgrx.sys Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00e15000 fffff880`00e1c000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00e1c000 fffff880`00e2c000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00e2c000 fffff880`00e46000 mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00e54000 fffff880`00f16000 Wdf01000 Wdf01000.sys Thu Jul 26 04: 25: 13 2012 (5010AA89)
fffff880`00f16000 fffff880`00f26000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`00f26000 fffff880`00f7d000 ACPI ACPI.sys Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00f7d000 fffff880`00f86000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00f86000 fffff880`00f90000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00f90000 fffff880`00fc3000 pci pci.sys Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fc3000 fffff880`00fd0000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00fd0000 fffff880`00fe5000 partmgr partmgr.sys Sat Mar 17 06: 12: 46 2012 (4F641D4E)
fffff880`00fe5000 fffff880`00fee000 compbatt compbatt.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`00fee000 fffff880`00ffa000 BATTC BATTC.SYS Tue Jul 14 01: 31: 01 2009 (4A5BC3B5)
fffff880`01000000 fffff880`01072000 cng cng.sys Sat Jun 02 05: 19: 52 2012 (4FC98658)
fffff880`01072000 fffff880`0108c000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`0108f000 fffff880`01299000 iaStor iaStor.sys Thu Mar 04 03: 51: 31 2010 (4B8F2033)
fffff880`01299000 fffff880`012a2000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`012a2000 fffff880`012cc000 ataport ataport.SYS Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`012cc000 fffff880`012d7000 msahci msahci.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`012d7000 fffff880`012e2000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`012e2000 fffff880`0132e000 fltmgr fltmgr.sys Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`0132e000 fffff880`01342000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`01342000 fffff880`01357000 Lbd Lbd.sys Thu Feb 03 15: 23: 53 2011 (4D4ABA79)
fffff880`01357000 fffff880`01360000 lullaby lullaby.sys Thu Jun 18 04: 45: 32 2009 (4A39AA4C)
fffff880`01360000 fffff880`013be000 msrpc msrpc.sys Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`013be000 fffff880`013ed000 ndiswan ndiswan.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`01412000 fffff880`015b4000 Ntfs Ntfs.sys Fri Aug 31 17: 13: 11 2012 (5040D487)
fffff880`015b4000 fffff880`015ce000 ksecdd ksecdd.sys Sat Jun 02 04: 47: 00 2012 (4FC97EA4)
fffff880`015ce000 fffff880`015df000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`015df000 fffff880`015e9000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 54: 36 2012 (4F4EF2FC)
fffff880`01600000 fffff880`01660000 NETIO NETIO.SYS Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`01660000 fffff880`0168b000 ksecpkg ksecpkg.sys Sat Jun 02 05: 20: 48 2012 (4FC98690)
fffff880`0168b000 fffff880`016d4000 fwpkclnt fwpkclnt.sys Fri Jan 04 04: 00: 34 2013 (50E645D2)
fffff880`016e6000 fffff880`017d8000 ndis ndis.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`017d8000 fffff880`017f9000 raspptp raspptp.sys Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Fri Jan 04 04: 03: 34 2013 (50E64686)
fffff880`01a00000 fffff880`01a26000 pacer pacer.sys Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`01a26000 fffff880`01a35000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`01a35000 fffff880`01a50000 wanarp wanarp.sys Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`01a50000 fffff880`01a6d000 tmtdi tmtdi.sys Wed Jul 15 11: 35: 55 2009 (4A5DA2FB)
fffff880`01a6d000 fffff880`01a81000 termdd termdd.sys Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`01a81000 fffff880`01a9c000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`01aa4000 fffff880`01af0000 volsnap volsnap.sys Thu Sep 06 16: 55: 02 2012 (5048B946)
fffff880`01af0000 fffff880`01af8000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01af8000 fffff880`01b32000 rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`01b32000 fffff880`01b44000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01b44000 fffff880`01b4d000 hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01b4d000 fffff880`01b87000 fvevol fvevol.sys Sat Sep 26 04: 34: 26 2009 (4ABD7DB2)
fffff880`01b87000 fffff880`01b9d000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01b9d000 fffff880`01bcd000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01bdb000 fffff880`01bff000 rasl2tp rasl2tp.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`02a00000 fffff880`02a0a000 vwifimp vwifimp.sys Tue Jul 14 02: 07: 28 2009 (4A5BCC40)
fffff880`02a10000 fffff880`02bf8000 vsapint vsapint.sys Fri Jul 30 11: 23: 32 2010 (4C529A14)
fffff880`02bf8000 fffff880`02c00000 ASMMAP64 ASMMAP64.sys Thu Jul 02 11: 13: 26 2009 (4A4C7A36)
fffff880`02e00000 fffff880`02e0d000 vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`02e0d000 fffff880`02e34000 jmcr jmcr.sys Tue Aug 18 10: 23: 06 2009 (4A8A64EA)
fffff880`02e34000 fffff880`02e63000 SCSIPORT SCSIPORT.SYS Tue Jul 14 02: 01: 04 2009 (4A5BCAC0)
fffff880`02e63000 fffff880`02e6b000 kbfiltr kbfiltr.sys Mon Jul 20 11: 21: 42 2009 (4A643726)
fffff880`02e6b000 fffff880`02e6f500 CmBatt CmBatt.sys Tue Jul 14 01: 31: 03 2009 (4A5BC3B7)
fffff880`02e70000 fffff880`02ff9000 athrx athrx.sys Wed Mar 03 01: 45: 21 2010 (4B8DB121)
fffff880`02ff9000 fffff880`02ffa480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`04000000 fffff880`04089000 afd afd.sys Wed Dec 28 04: 59: 08 2011 (4EFA940C)
fffff880`04089000 fffff880`0409f000 vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`0409f000 fffff880`04256800 snp2uvc snp2uvc.sys Thu Aug 20 04: 41: 36 2009 (4A8CB7E0)
fffff880`042c6000 fffff880`042f0000 cdrom cdrom.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`042f0000 fffff880`042f9000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`042f9000 fffff880`04300000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`04300000 fffff880`0430e000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`0430e000 fffff880`04333000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`04333000 fffff880`04343000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`04343000 fffff880`0434c000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`0434c000 fffff880`04355000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04355000 fffff880`0435e000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`0435e000 fffff880`04369000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`04369000 fffff880`0437a000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0437a000 fffff880`04398000 tdx tdx.sys Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`04398000 fffff880`043a5000 TDI TDI.SYS Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`043a5000 fffff880`043ea000 netbt netbt.sys Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`043ea000 fffff880`043f3000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`04600000 fffff880`04656000 USBPORT USBPORT.SYS Fri Mar 25 04: 23: 03 2011 (4D8C0A97)
fffff880`04656000 fffff880`04674000 i8042prt i8042prt.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`04674000 fffff880`04699000 ETD ETD.sys Mon Jan 18 13: 37: 56 2010 (4B545624)
fffff880`04699000 fffff880`046a8000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`046a8000 fffff880`046be000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`046be000 fffff880`046ce000 CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`046ce000 fffff880`046e4000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`046e4000 fffff880`046f0000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`046fd000 fffff880`0474e000 rdbss rdbss.sys Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`0474e000 fffff880`0475a000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`0475a000 fffff880`04765000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`04765000 fffff880`04774000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`04774000 fffff880`04792000 dfsc dfsc.sys Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`04792000 fffff880`047a3000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`047a3000 fffff880`047c9000 tunnel tunnel.sys Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`047c9000 fffff880`047f5000 atikmpag atikmpag.sys Fri Jan 22 14: 07: 54 2010 (4B59A32A)
fffff880`04a05000 fffff880`05049000 atipmdag atipmdag.sys Fri Jan 22 14: 46: 46 2010 (4B59AC46)
fffff880`05049000 fffff880`0513d000 dxgkrnl dxgkrnl.sys Wed Jan 26 05: 22: 56 2011 (4D3FA1A0)
fffff880`0513d000 fffff880`05183000 dxgmms1 dxgmms1.sys Wed Jan 26 05: 22: 12 2011 (4D3FA174)
fffff880`05183000 fffff880`051a7000 HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`051a7000 fffff880`051b8000 HECIx64 HECIx64.sys Thu Sep 17 21: 54: 16 2009 (4AB293E8)
fffff880`051b8000 fffff880`051c9000 usbehci usbehci.sys Fri Mar 25 04: 22: 57 2011 (4D8C0A91)
fffff880`051c9000 fffff880`051e8000 JME JME.sys Thu Feb 25 04: 26: 53 2010 (4B85EDFD)
fffff880`051e8000 fffff880`051f7000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`051f7000 fffff880`051ff000 ATK64AMD ATK64AMD.sys Wed May 13 03: 04: 54 2009 (4A0A1CB6)
fffff880`05200000 fffff880`0524e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 08: 52: 28 2010 (4B88CF3C)
fffff880`05270000 fffff880`052b3000 ks ks.sys Thu Mar 04 05: 32: 25 2010 (4B8F37D9)
fffff880`052b3000 fffff880`052c5000 umbus umbus.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`052c5000 fffff880`0531f000 usbhub usbhub.sys Fri Mar 25 04: 23: 22 2011 (4D8C0AAA)
fffff880`0531f000 fffff880`05334000 NDProxy NDProxy.SYS Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`05334000 fffff880`05355000 AtiHdmi AtiHdmi.sys Wed Sep 30 15: 54: 46 2009 (4AC36326)
fffff880`05355000 fffff880`05392000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`05392000 fffff880`053b4000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`053b4000 fffff880`053b9200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`05412000 fffff880`054c3000 CHDRT64 CHDRT64.sys Fri Oct 30 18: 50: 02 2009 (4AEB274A)
fffff880`054c3000 fffff880`054e0000 usbccgp usbccgp.sys Fri Mar 25 04: 23: 03 2011 (4D8C0A97)
fffff880`054e0000 fffff880`054e1f00 USBD USBD.SYS Fri Mar 25 04: 22: 51 2011 (4D8C0A8B)
fffff880`054e2000 fffff880`054f2d00 STREAM STREAM.SYS Tue Jul 14 02: 06: 18 2009 (4A5BCBFA)
fffff880`054f3000 fffff880`054fba80 sncduvc sncduvc.SYS Mon Dec 29 10: 14: 26 2008 (495894F2)
fffff880`054fc000 fffff880`05508000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`05508000 fffff880`05516000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`05516000 fffff880`055de000 HTTP HTTP.sys Tue Jul 14 01: 22: 16 2009 (4A5BC1A8)
fffff880`05800000 fffff880`05818000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`05818000 fffff880`05845000 mrxsmb mrxsmb.sys Sat Feb 27 08: 52: 19 2010 (4B88CF33)
fffff880`05845000 fffff880`05868000 mrxsmb20 mrxsmb20.sys Sat Feb 27 08: 52: 26 2010 (4B88CF3A)
fffff880`05891000 fffff880`05a9b000 dump_iaStor dump_iaStor.sys Thu Mar 04 03: 51: 31 2010 (4B8F2033)
fffff880`05a9b000 fffff880`05aae000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`05aae000 fffff880`05abc000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`05abc000 fffff880`05adf000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`05adf000 fffff880`05aee000 tmpreflt tmpreflt.sys Fri Jul 30 11: 30: 01 2010 (4C529B99)
fffff880`05aee000 fffff880`05b4d000 tmxpflt tmxpflt.sys Fri Jul 30 11: 30: 07 2010 (4C529B9F)
fffff880`05b4d000 fffff880`05b62000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`05b62000 fffff880`05bb5000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`05bb5000 fffff880`05bc8000 ndisuio ndisuio.sys Tue Jul 14 02: 09: 25 2009 (4A5BCCB5)
fffff880`05bc8000 fffff880`05be0000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`05be0000 fffff880`05bfe000 bowser bowser.sys Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff880`05c00000 fffff880`05c67000 srv2 srv2.sys Fri Aug 27 05: 37: 46 2010 (4C77330A)
fffff880`05cb6000 fffff880`05d5c000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`05d5c000 fffff880`05d67000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`05d67000 fffff880`05d94000 srvnet srvnet.sys Fri Aug 27 05: 37: 24 2010 (4C7732F4)
fffff880`05d94000 fffff880`05da6000 tcpipreg tcpipreg.sys Tue Jul 14 02: 09: 49 2009 (4A5BCCCD)
fffff880`060c5000 fffff880`0615b000 srv srv.sys Fri Aug 27 05: 38: 00 2010 (4C773318)
fffff880`0615b000 fffff880`06191000 fastfat fastfat.SYS Tue Jul 14 01: 23: 28 2009 (4A5BC1F0)
fffff960`000d0000 fffff960`003e6000 win32k win32k.sys Fri Jan 04 04: 22: 19 2013 (50E64AEB)
fffff960`00570000 fffff960`0057a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00660000 fffff960`00687000 cdd cdd.dll Wed Jan 26 07: 31: 34 2011 (4D3FBFC6)
fffff960`00890000 fffff960`008f1000 ATMFD ATMFD.DLL Sun Dec 16 15: 40: 45 2012 (50CDDD6D)
Unloaded modules:
fffff880`01bcd000 fffff880`01bdb000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`040a9000 fffff880`042b3000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0020A000
fffff880`042b3000 fffff880`042c6000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 00000019
Arguments 00000000`00000021 fffff900`c225d000 00000000`000035f0 000001fa`000001f9
[CPU Information]
~MHz = REG_DWORD 2394
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 37 Stepping 5
ProcessorNameString = REG_SZ Intel(R) Core(TM) i3 CPU M 370 @ 2.40GHz
Update Signature = REG_BINARY 0,0,0,0,1,0,0,0
Update Status = REG_DWORD 2
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 100000000
Machine ID Information [From Smbios 2.6, DMIVersion 38, Size=2771]
BiosMajorRelease = 4
BiosMinorRelease = 6
BiosVendor = American Megatrends Inc.
BiosVersion = K52JB.205
BiosReleaseDate = 05/12/2010
SystemManufacturer = ASUSTeK Computer Inc.
SystemProductName = K52JB
SystemFamily =
SystemVersion = 1.0
SystemSKU =
BaseBoardManufacturer = ASUSTeK Computer Inc.
BaseBoardProduct = K52JB
BaseBoardVersion = 1.0
CPUID: "Intel(R) Core(TM) i3 CPU M 370 @ 2.40GHz"
MaxSpeed: 2400
CurrentSpeed: 2394
[SMBIOS Data Tables v2.6]
[DMI Version - 38]
[2.0 Calling Convention - No]
[Table Size - 2771 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version K52JB.205
BIOS Starting Address Segment f000
BIOS Release Date 05/12/2010
BIOS ROM Size 200000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
32: - BIOS Vendor Reserved
34: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
07: - Smart Battery Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 4
BIOS Minor Revision 6
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK Computer Inc.
Product K52JB
Version 1.0
Serial Number
Asset Tag
Feature Flags 09h
264322420: - y
264322380: - y
Location MIDDLE
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer ASUSTeK Computer Inc.
Chassis Type Notebook
Lock Present
Version 1.0
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 42 - Handle 0004h]
Socket Designation Socket 989
Processor Type Central Processor
Processor Family bfh - Specification Reserved
Processor Manufacturer Intel
Processor ID 55060200fffbebbf
Processor Version Intel(R) Core(TM) i3 CPU M 370 @ 2.40GH
Processor Voltage 80h - 0.0V
External Clock 133MHz
Max Speed 4000MHz
Current Speed 2399MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle 0007h
Serial Number
Asset Tag Number
Part Number To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0020h - 32K
Installed Size 0020h - 32K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
Maximum Cache Size 0100h - 256K
Installed Size 0100h - 256K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0007h]
Socket Designation L3-Cache
Cache Configuration 0282h - Varies Enabled Int NonSocketed L3
Maximum Cache Size 0c00h - 3072K
Installed Size 0c00h - 3072K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity Other
[Onboard Devices Information (Type 10) - Length 6 - Handle 003bh]
Number of Devices 1
01: Type Video [disabled]
01: Description To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 003ch]
Number of Devices 1
01: Type Ethernet [disabled]
01: Description To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 003dh]
Number of Devices 1
01: Type Other [enabled]
01: Description Onboard 1394
[OEM Strings (Type 11) - Length 5 - Handle 003eh]
Number of Strings 1
1
[System Configuration Options (Type 12) - Length 5 - Handle 003fh]
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer ASUSTeK Computer Inc.
Product Name K52JB
Version 1.0
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber
Family
[Physical Memory Array (Type 16) - Length 15 - Handle 0041h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 16777216KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Device (Type 17) - Length 28 - Handle 0042h]
Physical Memory Array Handle 0041h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 0dh - SODIMM
Device Set [None]
Device Locator DIMM0
Bank Locator BANK 0
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1067MHz
Manufacturer 04CB
Serial Number
Asset Tag Number
Part Number AD73I1B1672EG
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0043h]
Starting Address 00000000h
Ending Address 001fffffh
Memory Device Handle 0042h
Mem Array Mapped Adr Handle 004bh
Partition Row Position [Unknown]
Interleave Position 01
Interleave Data Depth 01
[Memory Device (Type 17) - Length 28 - Handle 0044h]
Physical Memory Array Handle 0041h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM1
Bank Locator BANK 1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Device (Type 17) - Length 28 - Handle 0045h]
Physical Memory Array Handle 0041h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 1024MB
Form Factor 0dh - SODIMM
Device Set [None]
Device Locator DIMM2
Bank Locator BANK 2
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1067MHz
Manufacturer 06C1
Serial Number
Asset Tag Number
Part Number SSY3128M8-EDJED
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0046h]
Starting Address 00000000h
Ending Address 000fffffh
Memory Device Handle 0045h
Mem Array Mapped Adr Handle 004bh
Partition Row Position [Unknown]
Interleave Position 02
Interleave Data Depth 01
[Memory Device (Type 17) - Length 28 - Handle 004ah]
Physical Memory Array Handle 0041h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM3
Bank Locator BANK 3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 004bh]
Starting Address 00000000h
Ending Address 002fffffh
Memory Array Handle 0041h
Partition Width 04
0: kd> !pool fffff900c225d000
Pool page fffff900c225d000 region is Unknown
GetUlongFromAddress: unable to read from fffff800038701b0
fffff900c225d000 is not a valid small pool allocation, checking large pool...
unable to get pool big page table - either wrong symbols or pool tagging is disabled
fffff900c225d000 is freed (or corrupt) pool
Bad previous allocation size @fffff900c225d000, last size was 0
***
*** An error (or corruption) in the pool was detected;
*** Pool Region unknown (0xFFFFF900C225D000)
***
*** Use !poolval fffff900c225d000 for more details.
***
0: kd> !poolval fffff900c225d000
Pool page fffff900c225d000 region is Unknown
Validating Pool headers for pool page: fffff900c225d000
Pool page [ fffff900c225d000 ] is __inVALID.
Analyzing linked list...
[ fffff900c225d000 ]: invalid previous size [ 0x28 ] should be [ 0x0 ]
Scanning for single bit errors...
None found
Moja wiedza nie jest dorównująca niektórym guru z zagranicznych serwisów chrupających takie problemy na śniadanie czy gości z tytułem MVP posiadających wiedzę w tej dziedzinie IT.
Zresztą w przeciągu tak krótkiego czasu do momentu pokazania bsoda i tak nic nie zrobisz więc radziłby, po prostu przywrócić fabryczny system w tym Asusie.
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
|
Podziękowania od: |
|
|