Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c:\ARNE.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c9b670
Debug session time: Mon Oct 17 14:05:36.167 2011 (UTC + 2:00)
System Uptime: 0 days 0:52:23.995
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffffffffffff, 2, 1, fffff80002b043a2}
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 )
Followup: MachineOwnerProcessing initial command '!analyze -v'
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002b043a2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d05100
ffffffffffffffff
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff800`02b043a2 48890a mov qword ptr [rdx],rcx
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff88002178ee0 -- (.trap 0xfffff88002178ee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002179120
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b043a2 rsp=fffff88002179070 rbp=fffff88002179100
r8=0000000000000000 r9=0000000000000000 r10=fffffa80077f4690
r11=fffff80002d08a80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0x12:
fffff800`02b043a2 48890a mov qword ptr [rdx],rcx ds:0202:ffffffff`ffffffff=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad21e9 to fffff80002ad2c40
STACK_TEXT:
fffff880`02178d98 fffff800`02ad21e9 : 00000000`0000000a ffffffff`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02178da0 fffff800`02ad0e60 : fffff880`02170000 fffff960`00120000 ff002f00`ff00fe4e fffffa80`00212e20 : nt!KiBugCheckDispatch+0x69
fffff880`02178ee0 fffff800`02b043a2 : 00000000`00000000 00000000`00000001 fffffa80`078f96b8 00000000`00000001 : nt!KiPageFault+0x260
fffff880`02179070 fffff800`02ae326d : fffffa80`00212e20 00000000`00000000 fffff880`02179100 fffffa80`078f95b0 : nt!KxWaitForLockOwnerShip+0x12
fffff880`021790a0 fffff800`02b06e66 : fffffa80`00212e20 fffff6fb`82200040 fffffa80`00982860 fffffa80`009824d0 : nt!MiInsertPageInFreeOrZeroedList+0x55d
fffff880`021791b0 fffff800`02b07188 : 0000007f`fffffff8 00000000`00000000 80000000`0b0f6863 00000000`0000001c : nt!MiDeleteValidSystemPte+0x136
fffff880`021792b0 fffff800`02b063bd : fffffa80`084df3f8 fffffa80`0029c010 00000000`00000000 00000008`0000001c : nt!MiDeletePteRange+0x291
fffff880`02179330 fffff800`02b04f03 : 00000000`01fa4045 00000000`00003468 00000000`00002d07 00000000`00000001 : nt!MiUpdateWsleHash+0x2be
fffff880`021793a0 fffff800`02b06569 : 00000000`00000000 00000000`01fa4fff 00000000`00000000 00000001`00000001 : nt!MiDeleteVirtualAddresses+0x76b
fffff880`02179560 fffff800`02dea221 : fffffa80`09500740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`02179680 fffff800`02dea623 : fffffa80`00000000 00000000`01f70000 fffffa80`00000001 00000000`7efdf100 : nt!MiUnmapViewOfSection+0x1b1
fffff880`02179740 fffff800`02ad1ed3 : 00000000`00ffffff fffff960`0013a925 fffffa80`084df060 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`02179790 fffff800`02ace470 : fffff960`001759be 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02179928 fffff960`001759be : 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 00000000`00000000 : nt!KiServiceLinkage
fffff880`02179930 fffff960`00175d34 : ffffffff`00000000 fffff880`00000000 fffff900`c3415cc0 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x3a2
fffff880`02179a80 fffff960`001368e9 : ffffffff`cc050da7 fffff900`c3415cc0 00000000`00000da7 fffff960`0012736c : win32k!bDeleteSurface+0x34
fffff880`02179ab0 fffff800`02ad1ed3 : fffffa80`099cbb60 fffff900`c00bf010 00000000`00000018 00000000`7efdb000 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`02179ae0 00000000`74782e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000be5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74782e09
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3a2
fffff960`001759be e9d6010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`00175b99)
SYMBOL_STACK_INDEX: e
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e658d5a
FAILURE_BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2
BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2
Followup: MachineOwner
---------
Här är en översatt fil:) verkar peka mot chrome, så testa att ominstallera det och om inte det funkar så kör memtest i ett par timmar.