kleyou Napisano Sierpień 5, 2013 Zgłoś Share Napisano Sierpień 5, 2013 Witam. Proszę uprzejmię o pomoc, bo już wyczerpały mi się pomysły. Komp złożony przeze mnie, od początku był problem a to z bootowaniem z usb, a również z instalacją windowsa (pomogło wyjęcie jednej kości pamięci i przełożenie jej na inny slot). Mimo wszystko co jakiś czas wyskakuje blue screen, system zamula i wolno się włącza.Windows memory diagnostic wywala błąd hardware. Jeszcze nie testowałem pamiątek memtestem - zrobię to dzisiaj.SPRZĘT:asrock p67 pro3i5 3570kHD 7950 gigabyte rev 1.0ram patriot intel masters PVI38G160C9K 2x4GB 1600mhzseagate barracuda 500gb ST500DM002CORSAIR VS 550==================================================================Microsoft ® Windows Debugger Version 6.11.0001.402 X86Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\080513-19687-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is:Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.17273.amd64fre.win7_gdr.130318-1532Machine Name:Kernel base = 0xfffff800`02e02000 PsLoadedModuleList = 0xfffff800`0303ee70Debug session time: Mon Aug 5 01:38:02.521 2013 (GMT+2)System Uptime: 0 days 0:06:14.473Loading Kernel Symbols....................................................................................................................................................Loading User SymbolsLoading unloaded module list......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 50, {fffff6837f75fb80, 0, fffff80002e45c07, 5}Could not read faulting driver nameProbably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+11b )Followup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: fffff6837f75fb80, memory referenced.Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.Arg3: fffff80002e45c07, If non-zero, the instruction address which referenced the bad memory address.Arg4: 0000000000000005, (reserved)Debugging Details:------------------Could not read faulting driver nameREAD_ADDRESS: GetPointerFromAddress: unable to read from fffff800030a90e0 fffff6837f75fb80FAULTING_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]MM_INTERNAL_CODE: 5CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0x50PROCESS_NAME: mscorsvw.exeCURRENT_IRQL: 0TRAP_FRAME: fffff88009621010 -- (.trap 0xfffff88009621010)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000098000000000 rbx=0000000000000000 rcx=0000000000000c45rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000rip=fffff80002e45c07 rsp=fffff880096211a0 rbp=fffff70001083598 r8=fffffa8006f34cc8 r9=0000000000000001 r10=00000000000001b6r11=fffff70001080000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na pe cynt!MiDeleteAddressesInWorkingSet+0x11b:fffff800`02e45c07 488b1e mov rbx,qword ptr [rsi] ds:0572:00000000`00000000=????????????????Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80002ef0041 to fffff80002e71880STACK_TEXT: fffff880`09620ea8 fffff800`02ef0041 : 00000000`00000050 fffff683`7f75fb80 00000000`00000000 fffff880`09621010 : nt!KeBugCheckExfffff880`09620eb0 fffff800`02e6f96e : 00000000`00000000 0000000f`ffffffff 00000000`00001000 fffff800`02fa5bfe : nt! ?? ::FNODOBFM::`string'+0x4040bfffff880`09621010 fffff800`02e45c07 : 00000003`00000000 62100001`84bcf025 fffff700`01083590 fffff683`ff75c1e8 : nt!KiPageFault+0x16efffff880`096211a0 fffff800`02e44856 : fffffa80`06f34930 fffffa80`00000010 fffff8a0`000001b6 00000000`00000000 : nt!MiDeleteAddressesInWorkingSet+0x11bfffff880`09621a50 fffff800`0315109b : fffff8a0`0900bc50 00000000`00000001 00000000`00000000 fffffa80`0a6b1b60 : nt!MmCleanProcessAddressSpace+0x96fffff880`09621aa0 fffff800`0312a1fb : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92ffffff880`09621b60 fffff800`02e70ad3 : fffffa80`06f34930 000007fe`00000000 00000000`002d4101 fffffa80`0a6b1b60 : nt!NtTerminateProcess+0x25bfffff880`09621be0 00000000`77cbf97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`0017f578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cbf97aSTACK_COMMAND: kbFOLLOWUP_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]SYMBOL_STACK_INDEX: 3SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+11bFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntDEBUG_FLR_IMAGE_TIMESTAMP: 5147dc36IMAGE_NAME: memory_corruptionFAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bBUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bFollowup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: fffff6837f75fb80, memory referenced.Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.Arg3: fffff80002e45c07, If non-zero, the instruction address which referenced the bad memory address.Arg4: 0000000000000005, (reserved)Debugging Details:------------------Could not read faulting driver nameREAD_ADDRESS: fffff6837f75fb80FAULTING_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]MM_INTERNAL_CODE: 5CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0x50PROCESS_NAME: mscorsvw.exeCURRENT_IRQL: 0TRAP_FRAME: fffff88009621010 -- (.trap 0xfffff88009621010)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000098000000000 rbx=0000000000000000 rcx=0000000000000c45rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000rip=fffff80002e45c07 rsp=fffff880096211a0 rbp=fffff70001083598 r8=fffffa8006f34cc8 r9=0000000000000001 r10=00000000000001b6r11=fffff70001080000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na pe cynt!MiDeleteAddressesInWorkingSet+0x11b:fffff800`02e45c07 488b1e mov rbx,qword ptr [rsi] ds:0572:00000000`00000000=????????????????Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80002ef0041 to fffff80002e71880STACK_TEXT: fffff880`09620ea8 fffff800`02ef0041 : 00000000`00000050 fffff683`7f75fb80 00000000`00000000 fffff880`09621010 : nt!KeBugCheckExfffff880`09620eb0 fffff800`02e6f96e : 00000000`00000000 0000000f`ffffffff 00000000`00001000 fffff800`02fa5bfe : nt! ?? ::FNODOBFM::`string'+0x4040bfffff880`09621010 fffff800`02e45c07 : 00000003`00000000 62100001`84bcf025 fffff700`01083590 fffff683`ff75c1e8 : nt!KiPageFault+0x16efffff880`096211a0 fffff800`02e44856 : fffffa80`06f34930 fffffa80`00000010 fffff8a0`000001b6 00000000`00000000 : nt!MiDeleteAddressesInWorkingSet+0x11bfffff880`09621a50 fffff800`0315109b : fffff8a0`0900bc50 00000000`00000001 00000000`00000000 fffffa80`0a6b1b60 : nt!MmCleanProcessAddressSpace+0x96fffff880`09621aa0 fffff800`0312a1fb : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92ffffff880`09621b60 fffff800`02e70ad3 : fffffa80`06f34930 000007fe`00000000 00000000`002d4101 fffffa80`0a6b1b60 : nt!NtTerminateProcess+0x25bfffff880`09621be0 00000000`77cbf97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`0017f578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cbf97aSTACK_COMMAND: kbFOLLOWUP_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]SYMBOL_STACK_INDEX: 3SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+11bFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntDEBUG_FLR_IMAGE_TIMESTAMP: 5147dc36IMAGE_NAME: memory_corruptionFAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bBUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bFollowup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: fffff6837f75fb80, memory referenced.Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.Arg3: fffff80002e45c07, If non-zero, the instruction address which referenced the bad memory address.Arg4: 0000000000000005, (reserved)Debugging Details:------------------Could not read faulting driver nameREAD_ADDRESS: fffff6837f75fb80FAULTING_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]MM_INTERNAL_CODE: 5CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0x50PROCESS_NAME: mscorsvw.exeCURRENT_IRQL: 0TRAP_FRAME: fffff88009621010 -- (.trap 0xfffff88009621010)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000098000000000 rbx=0000000000000000 rcx=0000000000000c45rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000rip=fffff80002e45c07 rsp=fffff880096211a0 rbp=fffff70001083598 r8=fffffa8006f34cc8 r9=0000000000000001 r10=00000000000001b6r11=fffff70001080000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na pe cynt!MiDeleteAddressesInWorkingSet+0x11b:fffff800`02e45c07 488b1e mov rbx,qword ptr [rsi] ds:0572:00000000`00000000=????????????????Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80002ef0041 to fffff80002e71880STACK_TEXT: fffff880`09620ea8 fffff800`02ef0041 : 00000000`00000050 fffff683`7f75fb80 00000000`00000000 fffff880`09621010 : nt!KeBugCheckExfffff880`09620eb0 fffff800`02e6f96e : 00000000`00000000 0000000f`ffffffff 00000000`00001000 fffff800`02fa5bfe : nt! ?? ::FNODOBFM::`string'+0x4040bfffff880`09621010 fffff800`02e45c07 : 00000003`00000000 62100001`84bcf025 fffff700`01083590 fffff683`ff75c1e8 : nt!KiPageFault+0x16efffff880`096211a0 fffff800`02e44856 : fffffa80`06f34930 fffffa80`00000010 fffff8a0`000001b6 00000000`00000000 : nt!MiDeleteAddressesInWorkingSet+0x11bfffff880`09621a50 fffff800`0315109b : fffff8a0`0900bc50 00000000`00000001 00000000`00000000 fffffa80`0a6b1b60 : nt!MmCleanProcessAddressSpace+0x96fffff880`09621aa0 fffff800`0312a1fb : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92ffffff880`09621b60 fffff800`02e70ad3 : fffffa80`06f34930 000007fe`00000000 00000000`002d4101 fffffa80`0a6b1b60 : nt!NtTerminateProcess+0x25bfffff880`09621be0 00000000`77cbf97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`0017f578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cbf97aSTACK_COMMAND: kbFOLLOWUP_IP:nt!MiDeleteAddressesInWorkingSet+11bfffff800`02e45c07 488b1e mov rbx,qword ptr [rsi]SYMBOL_STACK_INDEX: 3SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+11bFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntDEBUG_FLR_IMAGE_TIMESTAMP: 5147dc36IMAGE_NAME: memory_corruptionFAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bBUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+11bFollowup: MachineOwner---------Problem signature: Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.256.1 Locale ID: 1045Additional information about the problem: BCCode: 124 BCP1: 0000000000000000 BCP2: FFFFFA800623D028 BCP3: 00000000B2000000 BCP4: 0000000081000402 OS Version: 6_1_7600 Service Pack: 0_0 Product: 256_1Files that help describe the problem: C:\Windows\Minidump\080513-12823-01.dmp C:\Users\kleyou\AppData\Local\Temp\WER-25568-0.sysdata.xmlProblem signature: Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.256.1 Locale ID: 1045Additional information about the problem: BCCode: 50 BCP1: FFFFF6837F75FB80 BCP2: 0000000000000000 BCP3: FFFFF80002E45C07 BCP4: 0000000000000005 OS Version: 6_1_7600 Service Pack: 0_0 Product: 256_1Files that help describe the problem: C:\Windows\Minidump\080513-19687-01.dmp C:\Users\kleyou\AppData\Local\Temp\WER-111852-0.sysdata.xmlRead our privacy statement online: http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409If the online privacy statement is not available, please read our privacy statement offline: C:\Windows\system32\en-US\erofflps.txtProszę każdego kto ma jakieś pomysły, o pomoc. Jestem bezradny Link do komentarza Udostępnij na innych stronach More sharing options...