New
#11
Well, here is your crash report.
According to Carrona.org, STOP 0x00000050: PAGE_FAULT_IN_NONPAGED_AREACode:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffffa80cbc8dc98, 0, fffff80002c51b3b, 5} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+27f ) Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffa80cbc8dc98, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002c51b3b, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb1100 fffffa80cbc8dc98 FAULTING_IP: nt!MiDeleteAddressesInWorkingSet+27f fffff800`02c51b3b 488b4128 mov rax,qword ptr [rcx+28h] MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: minirosetta_gr CURRENT_IRQL: 0 TRAP_FRAME: fffff8800ce3ecf0 -- (.trap 0xfffff8800ce3ecf0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000058000000000 rbx=0000000000000000 rcx=fffffa80cbc8dc70 rdx=0000000003279009 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002c51b3b rsp=fffff8800ce3ee80 rbp=fffff7000108de80 r8=fffffa8012ba6768 r9=0000000000000000 r10=0000000000000d9c r11=fffff70001080000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!MiDeleteAddressesInWorkingSet+0x27f: fffff800`02c51b3b 488b4128 mov rax,qword ptr [rcx+28h] ds:fffffa80`cbc8dc98=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002c288af to fffff80002c81fc0 STACK_TEXT: fffff880`0ce3eb88 fffff800`02c288af : 00000000`00000050 fffffa80`cbc8dc98 00000000`00000000 fffff880`0ce3ecf0 : nt!KeBugCheckEx fffff880`0ce3eb90 fffff800`02c800ee : 00000000`00000000 fffffa80`cbc8dc98 000f01ff`00020000 b3f00043`ed9ed867 : nt! ?? ::FNODOBFM::`string'+0x437c1 fffff880`0ce3ecf0 fffff800`02c51b3b : fffffa80`0cac50a8 fffff880`0ce3ef00 fffff880`0ce3f3b8 00000000`00000000 : nt!KiPageFault+0x16e fffff880`0ce3ee80 fffff800`02c52c9e : fffffa80`12ba63d0 fffffa80`00000008 fffff880`00000d9c fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x27f fffff880`0ce3f730 fffff800`02f5365a : fffff8a0`160af060 fffff880`0ce3fae0 00000000`00000000 fffffa80`139da060 : nt!MmCleanProcessAddressSpace+0x96 fffff880`0ce3f780 fffff800`02f36b7d : 00000000`00000000 00000000`00000001 00000000`7efd8000 fffffa80`12b98b50 : nt!PspExitThread+0x56a fffff880`0ce3f880 fffff800`02c74b3a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`02c7d810 : nt!PsExitSpecialApc+0x1d fffff880`0ce3f8b0 fffff800`02c74e80 : 00000000`00000246 fffff880`0ce3f930 fffff800`02f36af0 00000000`00000001 : nt!KiDeliverApc+0x2ca fffff880`0ce3f930 fffff800`02c812f7 : 00000000`00000000 fffff800`02f666ac fffff880`0ce3fb60 00000000`00000000 : nt!KiInitiateUserApc+0x70 fffff880`0ce3fa70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c STACK_COMMAND: kb FOLLOWUP_IP: nt!MiDeleteAddressesInWorkingSet+27f fffff800`02c51b3b 488b4128 mov rax,qword ptr [rcx+28h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+27f FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 503f82be IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+27f BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+27f Followup: MachineOwner ---------
Usual causes: Defective hardware (particularly memory - but not just RAM), Faulty system service, Antivirus, Device driver, NTFS corruption, BIOS
► For Memory,
RAM - Test with Memtest86+
Run it, for at least eight passes, preferably overnight.
► For Faulty sysem service.
SFC /SCANNOW Command - System File Checker
► For Antivirus,
Uninstall MSE.
How to manually uninstall Microsoft Security Essentials 1.0.1963 if you cannot uninstall it by using the Add or Remove Programs item
Then reinstall it again, and all the updates.
► For Device Driver,
Driver Verifier - Enable and Disable
Run Driver Verifier for 24 hours or the occurrence of the next crash, whichever is earlier.
► For NTFS corruption,
- Update your SSD,s firmware.
- Re-seat the sata and power.
- Run chkdsk /f/r, following the option two of the tutorial Disk Check
- Seatool for dos: SeaTools | Seagate download
Burn it in a blank cd. boot from the CD, click on "Accept", wait for it to finish detecting the drives, then in the upper left corner select "Basic Tests", then select "Long Test" and let it run.
► You may leave the BIOS alone, IMHO.
Do these and let us know the results :)Code:BIOS Version/Date American Megatrends Inc. P1.30, 7/13/2012