Bsod
hej jag får bsod väldigt ofta vid upppstart av min nya dator. Jag har uppdaterat bios och avinstallerat och installerat operativsystemet. har också gjort en virussökning som inte visade några virus. snälla hjälp.
jag har en dator med:
ga-p55a-udd3
intel i5
samsung spinpoint f3 500gb
corsair 4 gb 1333mhz
radeon xfx 5770 1 gb
corsair tx 650 w
DVD±RW Samsung 22X D
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Lukas\Desktop\072510-18610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\mappfördinasymbolfiler*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Sun Jul 25 13:42:36.862 2010 (UTC + 2:00)
System Uptime: 0 days 0:00:28.908
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 147c, 147e000028f9}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29771 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000147c
Arg4: 0000147e000028f9
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ccsvchst.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cea5fc to fffff80002c7b600
STACK_TEXT:
fffff880`088207e8 fffff800`02cea5fc : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000147c : nt!KeBugCheckEx
fffff880`088207f0 fffff800`02cad62b : 80000000`c8ea5882 80000000`c8ea5963 fffffa80`025abef0 0000000f`ffffffff : nt! ?? ::FNODOBFM::`string'+0x29771
fffff880`08820880 fffff800`02ca1c99 : 00000000`00000000 80000000`c8ea5882 fffff880`08820a10 fffffa80`061316d8 : nt!MiResolveTransitionFault+0x33b
fffff880`08820910 fffff800`02c9749e : 00000000`00000000 00000000`031a0000 fffff680`00018d00 fffffa80`061316d8 : nt!MiResolveProtoPteFault+0x419
fffff880`088209b0 fffff800`02c95623 : ffffffff`ffffff00 00000000`031a0000 00000000`00000000 fffff800`00000000 : nt!MiDispatchFault+0x1de
fffff880`08820ac0 fffff800`02c796ee : 00000000`00000000 00000000`031a0000 00000000`7ef26001 fffffa80`06142680 : nt!MmAccessFault+0x343
fffff880`08820c20 00000000`7788d959 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0300f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7788d959
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+29771
fffff800`02cea5fc cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29771
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29771
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29771
Followup: MachineOwner
---------
2: kd> lmvm nt
start end module name
fffff800`02c0b000 fffff800`031e7000 nt (pdb symbols) c:\mappfördinasymbolfiler\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\mappfördinasymbolfiler\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB)
CheckSum: 00545094
ImageSize: 005DC000
File version: 6.1.7600.16539
Product version: 6.1.7600.16539
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7600.16539
FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
vad är det för fel hjälp