Hej,
förlåt att jag inte har svarat tillbaka. Det har fungerat väldigt bra men nu så har det uppstod samma problem igen. Jag lägger till 2 st Windows minnesdumpar. Detta var vid 15:56 och 15:54. Jag förstår lite men ändå inte

Kan någon lysa lite tips på detta på vad man kan göra?
// Govinda
Specifikationer:
3 gb Ram, AMD Athlon 64 x2 Dual core prc 6000+ 3,0 GHz,Nivida Geforce 8600 GS, antivirus, MS security Essentials, MS Vista home Premium
Nr 1.
[php]
Loading Dump File [C:\Windows\Minidump\Mini121010-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0xe1c46000 PsLoadedModuleList = 0xe1d5dc70
Debug session time: Fri Dec 10 15:54:54.509 2010 (UTC + 1:00)
System Uptime: 0 days 0:00:43.336
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
* *
* Bugcheck Analysis *
* *
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, e1e7a771, a8bd7c18, 0}
Probably caused by : hardware ( nt!IoRemoveIoCompletion+43 )
Followup: MachineOwner
---------
1: kd> !analyze -v
* *
* Bugcheck Analysis *
* *
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: e1e7a771, The address that the exception occurred at
Arg3: a8bd7c18, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%08lx refererade till minnet p 0x%08lx. Det gick inte att utf ra en minnes tg rd. F ljande fel returnerades: The memory could not be %s.
FAULTING_IP:
nt!IoRemoveIoCompletion+43
e1e7a771 0000 add byte ptr [eax],al
TRAP_FRAME: a8bd7c18 -- (.trap 0xffffffffa8bd7c18)
ErrCode = 00000002
eax=00000001 ebx=e1e53ab5 ecx=e1d7e300 edx=00000000 esi=00cff8b0 edi=00000021
eip=e1e7a771 esp=a8bd7c8c ebp=a8bd7cc4 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!IoRemoveIoCompletion+0x43:
e1e7a771 0000 add byte ptr [eax],al ds

00000001=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!IoRemoveIoCompletion+43
e1e7a771 0000 add byte ptr [eax],al
LAST_CONTROL_TRANSFER: from e1e53ba5 to e1e7a771
STACK_TEXT:
a8bd7cc4 e1e53ba5 a40ad780 a8bd7cfc a8bd7d14 nt!IoRemoveIoCompletion+0x43
a8bd7d48 e1c90c7a 000000ac 00cff8e0 00cff8d0 nt!NtRemoveIoCompletion+0x106
a8bd7d48 77585e74 000000ac 00cff8e0 00cff8d0 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
00cff8b8 00000000 00000000 00000000 00000000 0x77585e74
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IoRemoveIoCompletion+43
e1e7a771 0000 add byte ptr [eax],al
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IoRemoveIoCompletion+43
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
[/php]nr 2.
[php]
Loading Dump File [C:\Windows\Minidump\Mini121010-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0xe1c4e000 PsLoadedModuleList = 0xe1d65c70
Debug session time: Fri Dec 10 15:53:41.807 2010 (UTC + 1:00)
System Uptime: 0 days 3:07:38.724
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
.......
* *
* Bugcheck Analysis *
* *
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, e1d3c82a, c302198c, 0}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+213 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: e1d3c82a, The address that the exception occurred at
Arg3: c302198c, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%08lx refererade till minnet p 0x%08lx. Det gick inte att utf ra en minnes tg rd. F ljande fel returnerades: The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+213
e1d3c82a 893b mov dword ptr [ebx],edi
TRAP_FRAME: c302198c -- (.trap 0xffffffffc302198c)
ErrCode = 00000002
eax=b7600edc ebx=00000000 ecx=000001ff edx=00000020 esi=b760015c edi=00000000
eip=e1d3c82a esp=c3021a00 ebp=c3021a38 iopl=0 nv up ei ng nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010297
nt!ExDeferredFreePool+0x213:
e1d3c82a 893b mov dword ptr [ebx],edi ds

00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: spotify.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from e1d030f9 to e1d3c82a
STACK_TEXT:
c3021a38 e1d030f9 b7600dc0 00000001 ef3b1828 nt!ExDeferredFreePool+0x213
c3021a90 e1d3bc57 00000000 00000021 ef3b1828 nt!ExpAllocateBigPool+0xb0
c3021af0 b7b46459 00000021 ef3b1820 34316847 nt!ExAllocatePoolWithTag+0x116
WARNING: Stack unwind information not available. Following frames may be wrong.
c3021b04 b7b4a28d ef3b1820 34316847 ef3b1820 win32k+0xc6459
c3021b20 b7b4ad04 ef3b1820 00000004 00000000 win32k+0xca28d
c3021b3c b7b3a114 ef3b1820 c3021b74 c3021b5c win32k+0xcad04
c3021b4c b7b17024 ef3b1820 c3021c30 c3021b6c win32k+0xba114
c3021b5c b7b1704a ef3b1820 fe2eaf90 c3021ba0 win32k+0x97024
c3021b6c b7b4c9ad ef3b1820 c3021c38 00000080 win32k+0x9704a
c3021ba0 b7b33f12 ef3b1790 00000070 00000008 win32k+0xcc9ad
c3021bf4 b7b2dc13 c3021c2c c3021c38 00000001 win32k+0xb3f12
c3021c3c b7b4bbf7 c3021d18 c3021c94 b7afdd52 win32k+0xadc13
c3021c50 b7b508b4 c3021cd8 03f9854c c3021ce8 win32k+0xcbbf7
c3021c60 b7afddf8 c3021cd8 03f9854c b7afdd52 win32k+0xd08b4
c3021ce8 b7afddaa 1f0103a6 c3021d08 74c6fb8d win32k+0x7ddf8
c3021d34 e1c98c7a 1f0103a6 03f9853c 0012f894 win32k+0x7ddaa
c3021d34 77d65e74 1f0103a6 03f9853c 0012f894 nt!KiFastCallEntry+0x12a
0012f894 00000000 00000000 00000000 00000000 0x77d65e74
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+213
e1d3c82a 893b mov dword ptr [ebx],edi
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+213
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0x8E_nt!ExDeferredFreePool+213
BUCKET_ID: 0x8E_nt!ExDeferredFreePool+213
Followup: Pool_corruption
---------
[/php]