Widok blue screena:

Sprzęt to laptop Lenovo B50-80;
Wykonałem test w MemTest86+ 5.01: po 5 przebiegach nie wykryto żadnego błędu:

SMART dysku:
Kod: Zaznacz cały
HD Tune: ST1000LM024 HN-M101MBB Health
ID Current Worst ThresholdData Status
(01) Raw Read Error Rate 100 100 51 1 Ok
(02) Throughput Performance 252 252 0 0 Ok
(03) Spin Up Time 93 91 25 2384 Ok
(04) Start/Stop Count 100 100 0 223 Ok
(05) Reallocated Sector Count 252 252 10 0 Ok
(07) Seek Error Rate 252 252 51 0 Ok
(08) Seek Time Performance 252 252 15 0 Ok
(09) Power On Hours Count 100 100 0 171 Ok
(0A) Spin Retry Count 252 252 51 0 Ok
(0B) Calibration Retry Count 252 252 0 0 Ok
(0C) Power Cycle Count 100 100 0 216 Ok
(BF) G-sense Error Rate 100 100 0 4 Ok
(C0) Power Off Retract Count 100 100 0 7 Ok
(C2) Temperature 64 60 0 1179681 Ok
(C3) Hardware ECC Recovered 100 100 0 0 Ok
(C4) Reallocated Event Count 252 252 0 0 Ok
(C5) Current Pending Sector 252 252 0 0 Ok
(C6) Offline Uncorrectable 252 252 0 0 Ok
(C7) Ultra DMA CRC Error Count 200 200 0 0 Ok
(C8) Write Error Rate 100 100 0 52 Ok
(DF) Load/Unload Retry Count 252 252 0 0 Ok
(E1) Load/Unload Cycle Count 100 100 0 861 Ok
Power On Time : 171
Health Status : Ok
Odczyt z pliku uszkodzeń:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\022716-17113-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19135.amd64fre.win7sp1_gdr.160121-1718
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`03095730
Debug session time: Sat Feb 27 14:13:01.766 2016 (GMT+1)
System Uptime: 0 days 0:00:10.186
Loading Kernel Symbols
...............................................................
................................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a008bd9000, 0, fffff88007c33d36, 0}
Unable to load image \SystemRoot\system32\DRIVERS\iusb3hub.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iusb3hub.sys
*** ERROR: Module load completed but symbols could not be loaded for iusb3hub.sys
Could not read faulting driver name
Probably caused by : iusb3hub.sys ( iusb3hub+bd36 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a008bd9000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88007c33d36, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff100
fffff8a008bd9000
FAULTING_IP:
iusb3hub+bd36
fffff880`07c33d36 4239540008 cmp dword ptr [rax+r8+8],edx
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031d9540 -- (.trap 0xfffff880031d9540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000017 rbx=0000000000000000 rcx=fffff88007c5eda0
rdx=00000000444c505f rsi=0000000000000000 rdi=0000000000000000
rip=fffff88007c33d36 rsp=fffff880031d96d0 rbp=fffff88007c5ec00
r8=fffff8a008bd8fe0 r9=0000000000000000 r10=fffffa80042f2e80
r11=0000000000000018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
iusb3hub+0xbd36:
fffff880`07c33d36 4239540008 cmp dword ptr [rax+r8+8],edx ds:97e0:fffff8a0`08bd8fff=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f3e217 to fffff80002ec23c0
STACK_TEXT:
fffff880`031d93d8 fffff800`02f3e217 : 00000000`00000050 fffff8a0`08bd9000 00000000`00000000 fffff880`031d9540 : nt!KeBugCheckEx
fffff880`031d93e0 fffff800`02ec04ee : 00000000`00000000 fffff8a0`08bd9000 fffff8a0`08b61c00 00000000`00000013 : nt! ?? ::FNODOBFM::`string'+0x417df
fffff880`031d9540 fffff880`07c33d36 : fffffa80`063ac1b0 fffffa80`06361040 fffffa80`063ac1b0 fffff880`07c5ec00 : nt!KiPageFault+0x16e
fffff880`031d96d0 fffffa80`063ac1b0 : fffffa80`06361040 fffffa80`063ac1b0 fffff880`07c5ec00 fffff8a0`00c10cd0 : iusb3hub+0xbd36
fffff880`031d96d8 fffffa80`06361040 : fffffa80`063ac1b0 fffff880`07c5ec00 fffff8a0`00c10cd0 fffff880`00000194 : 0xfffffa80`063ac1b0
fffff880`031d96e0 fffffa80`063ac1b0 : fffff880`07c5ec00 fffff8a0`00c10cd0 fffff880`00000194 fffffa80`042ccb00 : 0xfffffa80`06361040
fffff880`031d96e8 fffff880`07c5ec00 : fffff8a0`00c10cd0 fffff880`00000194 fffffa80`042ccb00 fffff880`031d9778 : 0xfffffa80`063ac1b0
fffff880`031d96f0 fffff8a0`00c10cd0 : fffff880`00000194 fffffa80`042ccb00 fffff880`031d9778 fffff880`031d9790 : iusb3hub+0x36c00
fffff880`031d96f8 fffff880`00000194 : fffffa80`042ccb00 fffff880`031d9778 fffff880`031d9790 fffff880`031d9780 : 0xfffff8a0`00c10cd0
fffff880`031d9700 fffffa80`042ccb00 : fffff880`031d9778 fffff880`031d9790 fffff880`031d9780 01000000`00000000 : 0xfffff880`00000194
fffff880`031d9708 fffff880`031d9778 : fffff880`031d9790 fffff880`031d9780 01000000`00000000 00000000`00000001 : 0xfffffa80`042ccb00
fffff880`031d9710 fffff880`031d9790 : fffff880`031d9780 01000000`00000000 00000000`00000001 fffffa80`0000005d : 0xfffff880`031d9778
fffff880`031d9718 fffff880`031d9780 : 01000000`00000000 00000000`00000001 fffffa80`0000005d 00000000`00000000 : 0xfffff880`031d9790
fffff880`031d9720 01000000`00000000 : 00000000`00000001 fffffa80`0000005d 00000000`00000000 fffffa80`00000003 : 0xfffff880`031d9780
fffff880`031d9728 00000000`00000001 : fffffa80`0000005d 00000000`00000000 fffffa80`00000003 fffff8a0`00c10cd0 : 0x1000000`00000000
fffff880`031d9730 fffffa80`0000005d : 00000000`00000000 fffffa80`00000003 fffff8a0`00c10cd0 00000001`0000261b : 0x1
fffff880`031d9738 00000000`00000000 : fffffa80`00000003 fffff8a0`00c10cd0 00000001`0000261b fffff8a0`08bd8320 : 0xfffffa80`0000005d
STACK_COMMAND: kb
FOLLOWUP_IP:
iusb3hub+bd36
fffff880`07c33d36 4239540008 cmp dword ptr [rax+r8+8],edx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iusb3hub+bd36
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iusb3hub
IMAGE_NAME: iusb3hub.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53e4cc00
FAILURE_BUCKET_ID: X64_0x50_iusb3hub+bd36
BUCKET_ID: X64_0x50_iusb3hub+bd36
Followup: MachineOwner
---------
Usunąłem wszystkie błędy rejestru, przy pomocy WinThruster, lecz to nie pomogło.
Proszę o pomoc.