BSOD / Plantage repeté
Fermé
Toda
-
22 juin 2022 à 12:26
vieu bison boiteu Messages postés 44306 Date d'inscription lundi 11 avril 2005 Statut Contributeur Dernière intervention 19 août 2024 - 23 juin 2022 à 14:46
vieu bison boiteu Messages postés 44306 Date d'inscription lundi 11 avril 2005 Statut Contributeur Dernière intervention 19 août 2024 - 23 juin 2022 à 14:46
2 réponses
vieu bison boiteu
Messages postés
44306
Date d'inscription
lundi 11 avril 2005
Statut
Contributeur
Dernière intervention
19 août 2024
3 551
22 juin 2022 à 12:39
22 juin 2022 à 12:39
salut Toda
tu vas installer >>> whocrashed <<< pour interroger les fichiers d'erreurs
[https://whocrashed.fr.uptodown.com/windows >>> téléchargement <<<
et nous poster le dernier fichier ( copier/coller )
@+
tu vas installer >>> whocrashed <<< pour interroger les fichiers d'erreurs
[https://whocrashed.fr.uptodown.com/windows >>> téléchargement <<<
et nous poster le dernier fichier ( copier/coller )
@+
vieu bison boiteu
Messages postés
44306
Date d'inscription
lundi 11 avril 2005
Statut
Contributeur
Dernière intervention
19 août 2024
3 551
23 juin 2022 à 14:46
23 juin 2022 à 14:46
OK
regarde déjà à tester tes barrettes mémoires >>> avec MemTest <<<
savoir si elles sont entièrement intégre
@+
regarde déjà à tester tes barrettes mémoires >>> avec MemTest <<<
savoir si elles sont entièrement intégre
@+
22 juin 2022 à 12:45
J'avais déjà Whocrashed voici le dernier rapport
On Wed 22/06/2022 09:33:46 your computer crashed or a problem was reported
crash dump file: C:\Windows\Minidump\062222-7609-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x415590)
Bugcheck code: 0x7A (0x1, 0xFFFFFFFFC0000005, 0xFFFFBA0F235890C0, 0xFFFFCBBEFAC25000)
Error: KERNEL_DATA_INPAGE_ERROR
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This bug check indicates that the requested page of kernel data from the paging file could not be read into memory.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
On Wed 22/06/2022 09:33:46 your computer crashed or a problem was reported
crash dump file: C:\Windows\MEMORY.DMP
This was probably caused by the following module: ntkrnlmp.exe (nt!ExTryAcquireSpinLockSharedAtDpcLevel+0x6EC0B)
Bugcheck code: 0x7A (0x1, 0xFFFFFFFFC0000005, 0xFFFFBA0F235890C0, 0xFFFFCBBEFAC25000)
Error: KERNEL_DATA_INPAGE_ERROR
Bug check description: This bug check indicates that the requested page of kernel data from the paging file could not be read into memory.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
22 juin 2022 à 12:50
On Wed 22/06/2022 12:46:51 your computer crashed or a problem was reported
crash dump file: C:\Windows\Minidump\062222-10093-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x417850)
Bugcheck code: 0xA (0xFFFF958435165799, 0x2, 0x0, 0xFFFFF8045557032C)
Error: IRQL_NOT_LESS_OR_EQUAL
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above. This is a software bug.
This bug check belongs to the crash dump test that you have performed with WhoCrashed or other software. It means that a crash dump file was properly written out.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
On Wed 22/06/2022 12:46:51 your computer crashed or a problem was reported
crash dump file: C:\Windows\MEMORY.DMP
This was probably caused by the following module: ntkrnlmp.exe (nt!setjmpex+0x85A9)
Bugcheck code: 0xA (0xFFFF958435165799, 0x2, 0x0, 0xFFFFF8045557032C)
Error: IRQL_NOT_LESS_OR_EQUAL
Bug check description: This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above. This is a software bug.
This bug check belongs to the crash dump test that you have performed with WhoCrashed or other software. It means that a crash dump file was properly written out.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.