Latest one
Update of ie gone successful no sing of BSOD again will keep you updated :)
Specs
Code:
Summary
Operating System
Windows 7 Ultimate 32-bit SP1
CPU
Intel Atom N2600 @ 1.60GHz 62 °C
Cedarview 32nm Technology
RAM
2.00GB
Motherboard
ASUSTeK COMPUTER INC. 1015CX (CPU 1) 27 °C
Graphics
HSD100IFW4A (1024x600@60Hz)
Intel Graphics Media Accelerator 3600 Series (ASUStek Computer Inc)
Storage
298GB Western Digital WDC WD3200BPVT-80JJ5T0 (SATA) 41 °C
931GB TOSHIBA External USB 3.0 USB Device (USB (SATA)) 34 °C
7GB Sony Storage Media USB Device (USB)
Optical Drives
No optical disk drives detected
Audio
High Definition Audio Device
Asus Product page
Notebooks & Ultrabooks - Eee PC 1015CX - ASUS
Code:
Loading Dump File [O:\Minidump\New folder\083114-45209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {93b02008, 6fc88101, a3147a04, a}
Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+dc )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 93b02008, Virtual address for the attempted write.
Arg2: 6fc88101, PTE contents.
Arg3: a3147a04, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: a3147a04 -- (.trap 0xffffffffa3147a04)
ErrCode = 00000003
eax=93b02008 ebx=00000100 ecx=00000000 edx=fffffffe esi=86d300b0 edi=86f02000
eip=81b0103d esp=a3147a78 ebp=a3147aa8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiReleaseConfirmedPageFileSpace+0x89:
81b0103d 2110 and dword ptr [eax],edx ds:0023:93b02008=00001000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a91aa8 to 81ade879
STACK_TEXT:
a31479ec 81a91aa8 00000001 93b02008 00000000 nt!MmAccessFault+0x104
a31479ec 81b0103d 00000001 93b02008 00000000 nt!KiTrap0E+0xdc
a3147aa8 81aeff9c 00000000 66000000 68195fff nt!MiReleaseConfirmedPageFileSpace+0x89
a3147ba8 81af0632 66e40002 68195fff 874b76a8 nt!MiDeleteVirtualAddresses+0x356
a3147c78 81af02e7 874b76a8 8724c760 876c4368 nt!MiRemoveMappedView+0x325
a3147ca0 81c98506 876c4368 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a3147d04 81cb6a1f 874b76a8 66e40000 00000000 nt!MiUnmapViewOfSection+0x265
a3147d24 81a8e8c6 ffffffff 66e40000 036aebe0 nt!NtUnmapViewOfSection+0x55
a3147d24 778870f4 ffffffff 66e40000 036aebe0 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
036aebe0 00000000 00000000 00000000 00000000 0x778870f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81a91aa8 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53158c8f
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: 0xBE_nt!KiTrap0E+dc
BUCKET_ID: 0xBE_nt!KiTrap0E+dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!kitrap0e+dc
FAILURE_ID_HASH: {9526f5c2-9c1b-c6b9-1949-a4d935a6ed15}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 93b02008, Virtual address for the attempted write.
Arg2: 6fc88101, PTE contents.
Arg3: a3147a04, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: a3147a04 -- (.trap 0xffffffffa3147a04)
ErrCode = 00000003
eax=93b02008 ebx=00000100 ecx=00000000 edx=fffffffe esi=86d300b0 edi=86f02000
eip=81b0103d esp=a3147a78 ebp=a3147aa8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiReleaseConfirmedPageFileSpace+0x89:
81b0103d 2110 and dword ptr [eax],edx ds:0023:93b02008=00001000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a91aa8 to 81ade879
STACK_TEXT:
a31479ec 81a91aa8 00000001 93b02008 00000000 nt!MmAccessFault+0x104
a31479ec 81b0103d 00000001 93b02008 00000000 nt!KiTrap0E+0xdc
a3147aa8 81aeff9c 00000000 66000000 68195fff nt!MiReleaseConfirmedPageFileSpace+0x89
a3147ba8 81af0632 66e40002 68195fff 874b76a8 nt!MiDeleteVirtualAddresses+0x356
a3147c78 81af02e7 874b76a8 8724c760 876c4368 nt!MiRemoveMappedView+0x325
a3147ca0 81c98506 876c4368 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a3147d04 81cb6a1f 874b76a8 66e40000 00000000 nt!MiUnmapViewOfSection+0x265
a3147d24 81a8e8c6 ffffffff 66e40000 036aebe0 nt!NtUnmapViewOfSection+0x55
a3147d24 778870f4 ffffffff 66e40000 036aebe0 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
036aebe0 00000000 00000000 00000000 00000000 0x778870f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81a91aa8 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53158c8f
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: 0xBE_nt!KiTrap0E+dc
BUCKET_ID: 0xBE_nt!KiTrap0E+dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!kitrap0e+dc
FAILURE_ID_HASH: {9526f5c2-9c1b-c6b9-1949-a4d935a6ed15}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 93b02008, Virtual address for the attempted write.
Arg2: 6fc88101, PTE contents.
Arg3: a3147a04, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: a3147a04 -- (.trap 0xffffffffa3147a04)
ErrCode = 00000003
eax=93b02008 ebx=00000100 ecx=00000000 edx=fffffffe esi=86d300b0 edi=86f02000
eip=81b0103d esp=a3147a78 ebp=a3147aa8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiReleaseConfirmedPageFileSpace+0x89:
81b0103d 2110 and dword ptr [eax],edx ds:0023:93b02008=00001000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a91aa8 to 81ade879
STACK_TEXT:
a31479ec 81a91aa8 00000001 93b02008 00000000 nt!MmAccessFault+0x104
a31479ec 81b0103d 00000001 93b02008 00000000 nt!KiTrap0E+0xdc
a3147aa8 81aeff9c 00000000 66000000 68195fff nt!MiReleaseConfirmedPageFileSpace+0x89
a3147ba8 81af0632 66e40002 68195fff 874b76a8 nt!MiDeleteVirtualAddresses+0x356
a3147c78 81af02e7 874b76a8 8724c760 876c4368 nt!MiRemoveMappedView+0x325
a3147ca0 81c98506 876c4368 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a3147d04 81cb6a1f 874b76a8 66e40000 00000000 nt!MiUnmapViewOfSection+0x265
a3147d24 81a8e8c6 ffffffff 66e40000 036aebe0 nt!NtUnmapViewOfSection+0x55
a3147d24 778870f4 ffffffff 66e40000 036aebe0 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
036aebe0 00000000 00000000 00000000 00000000 0x778870f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81a91aa8 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53158c8f
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: 0xBE_nt!KiTrap0E+dc
BUCKET_ID: 0xBE_nt!KiTrap0E+dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!kitrap0e+dc
FAILURE_ID_HASH: {9526f5c2-9c1b-c6b9-1949-a4d935a6ed15}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 93b02008, Virtual address for the attempted write.
Arg2: 6fc88101, PTE contents.
Arg3: a3147a04, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: a3147a04 -- (.trap 0xffffffffa3147a04)
ErrCode = 00000003
eax=93b02008 ebx=00000100 ecx=00000000 edx=fffffffe esi=86d300b0 edi=86f02000
eip=81b0103d esp=a3147a78 ebp=a3147aa8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiReleaseConfirmedPageFileSpace+0x89:
81b0103d 2110 and dword ptr [eax],edx ds:0023:93b02008=00001000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a91aa8 to 81ade879
STACK_TEXT:
a31479ec 81a91aa8 00000001 93b02008 00000000 nt!MmAccessFault+0x104
a31479ec 81b0103d 00000001 93b02008 00000000 nt!KiTrap0E+0xdc
a3147aa8 81aeff9c 00000000 66000000 68195fff nt!MiReleaseConfirmedPageFileSpace+0x89
a3147ba8 81af0632 66e40002 68195fff 874b76a8 nt!MiDeleteVirtualAddresses+0x356
a3147c78 81af02e7 874b76a8 8724c760 876c4368 nt!MiRemoveMappedView+0x325
a3147ca0 81c98506 876c4368 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a3147d04 81cb6a1f 874b76a8 66e40000 00000000 nt!MiUnmapViewOfSection+0x265
a3147d24 81a8e8c6 ffffffff 66e40000 036aebe0 nt!NtUnmapViewOfSection+0x55
a3147d24 778870f4 ffffffff 66e40000 036aebe0 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
036aebe0 00000000 00000000 00000000 00000000 0x778870f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81a91aa8 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53158c8f
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: 0xBE_nt!KiTrap0E+dc
BUCKET_ID: 0xBE_nt!KiTrap0E+dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!kitrap0e+dc
FAILURE_ID_HASH: {9526f5c2-9c1b-c6b9-1949-a4d935a6ed15}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 93b02008, Virtual address for the attempted write.
Arg2: 6fc88101, PTE contents.
Arg3: a3147a04, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: a3147a04 -- (.trap 0xffffffffa3147a04)
ErrCode = 00000003
eax=93b02008 ebx=00000100 ecx=00000000 edx=fffffffe esi=86d300b0 edi=86f02000
eip=81b0103d esp=a3147a78 ebp=a3147aa8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiReleaseConfirmedPageFileSpace+0x89:
81b0103d 2110 and dword ptr [eax],edx ds:0023:93b02008=00001000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81a91aa8 to 81ade879
STACK_TEXT:
a31479ec 81a91aa8 00000001 93b02008 00000000 nt!MmAccessFault+0x104
a31479ec 81b0103d 00000001 93b02008 00000000 nt!KiTrap0E+0xdc
a3147aa8 81aeff9c 00000000 66000000 68195fff nt!MiReleaseConfirmedPageFileSpace+0x89
a3147ba8 81af0632 66e40002 68195fff 874b76a8 nt!MiDeleteVirtualAddresses+0x356
a3147c78 81af02e7 874b76a8 8724c760 876c4368 nt!MiRemoveMappedView+0x325
a3147ca0 81c98506 876c4368 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a3147d04 81cb6a1f 874b76a8 66e40000 00000000 nt!MiUnmapViewOfSection+0x265
a3147d24 81a8e8c6 ffffffff 66e40000 036aebe0 nt!NtUnmapViewOfSection+0x55
a3147d24 778870f4 ffffffff 66e40000 036aebe0 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
036aebe0 00000000 00000000 00000000 00000000 0x778870f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81a91aa8 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53158c8f
IMAGE_VERSION: 6.1.7601.18409
FAILURE_BUCKET_ID: 0xBE_nt!KiTrap0E+dc
BUCKET_ID: 0xBE_nt!KiTrap0E+dc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!kitrap0e+dc
FAILURE_ID_HASH: {9526f5c2-9c1b-c6b9-1949-a4d935a6ed15}
Followup: MachineOwner
---------