New
#31
i have turned off verifier, and run file check. it didn't find any errors again
i have turned off verifier, and run file check. it didn't find any errors again
i have new problem :S computer is freezing randomly once (twice?) per day but without any bsod :S sound stop working, keyboard is dead, only mouse is moving, but its not useful cause i cannot click anything. shall i turn on that driver verifier again?
I wonder if your Realtek Network drivers are the cause. Look on the computer manufacturer's site for an update.
BSOOOOOD! i have turned on driver verifier, and updated realtek network!
Don't see much from the DMP, let's wait until driver verifier give us more result
For now, Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: http://www.duplexsecure.com/en/downloads
Code:BugCheck A, {83fffff0, 2, 1, 82ca0962} Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+70 ) Followup: MachineOwner --------- PROCESS_NAME: Keytro.exev<----??? CD key getting program??not ok BugCheck 24, {1904fb, 92edd85c, 92edd440, 82cb8759} Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+13e ) Followup: MachineOwner ---------
Last edited by ttran; 08 Aug 2010 at 09:50.
Hi, Kuleee. The Driver Verifier enabled dump points to Keytro.exe as the cause of the crash. This appears to be a game, Starcraft? It this is a cracked copy and ketro.exe is the keygen (as it appears to be), immediately uninstall the game and ketro.exe. I recommend that you download and use Revo (free) uninstaller for this. (1) ketro.exe is blamed for the crash and (2) we absolutely do not support piracy at Seven Forums. Cracked copies often cause system problems.
Stop error code A means a hardware problem. Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-20484-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82c19000 PsLoadedModuleList = 0x82d58570 Debug session time: Sun Aug 8 08:39:20.495 2010 (GMT-4) System Uptime: 0 days 0:22:40.582 Loading Kernel Symbols ............................................................... ................................................................ ................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {1, 2, 1, 8301c839} Probably caused by : win32k.sys ( win32k!GreAcquireSemaphore+16 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000001, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 8301c839, address which referenced memory Debugging Details: ------------------ WORKER_ROUTINE: +54f7952f01ecdcf0 00000001 ?? ??? WORK_ITEM: 8301c839 CURRENT_IRQL: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xA PROCESS_NAME: Keytro.exe TRAP_FRAME: a1d6e958 -- (.trap 0xffffffffa1d6e958) ErrCode = 00000002 eax=a1d6e9f8 ebx=00000000 ecx=98ed7ac4 edx=00000001 esi=98ed7a90 edi=82d3ad20 eip=8301c839 esp=a1d6e9cc ebp=a1d6ea10 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29: 8301c839 8902 mov dword ptr [edx],eax ds:0023:00000001=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 8301c839 to 82c51b5b STACK_TEXT: a1d6e958 8301c839 badb0d00 00000001 00000000 nt!KiTrap0E+0x2cf a1d6e9c8 82c7ce5c 00000000 98ed7a90 86b481b0 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29 a1d6ea10 82ccc621 98ed7a90 00000001 a1d6eb10 nt!ExAcquireResourceExclusiveLite+0xd4 a1d6ea20 949abb6f 98ed7a90 86b4807e 94919c85 nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x1c a1d6ea2c 94919c85 86b4807e 00000000 86b481b0 win32k!GreAcquireSemaphore+0x16 a1d6eb10 949196a2 a1d6ead0 ffffaa27 ff9ee670 win32k!DrvInternalChangeDisplaySettings+0x2ce a1d6ec2c 949f99af 00000000 ffb8f748 00248430 win32k!DrvChangeDisplaySettings+0x8fe a1d6ec88 949fa2ab 00000000 00248430 8d7cfd88 win32k!xxxInternalUserChangeDisplaySettings+0x247 a1d6ecf8 949f9e07 00000000 00248430 00000000 win32k!xxxUserChangeDisplaySettings+0x67 a1d6ed1c 82c4e79a 00000000 00248430 00000004 win32k!NtUserChangeDisplaySettings+0x60 a1d6ed1c 77f064f4 00000000 00248430 00000004 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0012fdb0 00000000 00000000 00000000 00000000 0x77f064f4 STACK_COMMAND: kb FOLLOWUP_IP: win32k!GreAcquireSemaphore+16 949abb6f 5e pop esi SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: win32k!GreAcquireSemaphore+16 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc2a2 FAILURE_BUCKET_ID: 0xA_VRF_win32k!GreAcquireSemaphore+16 BUCKET_ID: 0xA_VRF_win32k!GreAcquireSemaphore+16 Followup: MachineOwner ---------
Ttran posted while I was typing. Follow his advice and uninstall sptd.sys as well as what I have suggested.
Your other two dumps are not Driver Verifier enabled dumps. Here are the error codes:
These are hardware or hardware related error codes. Notice what is in common in the two, drivers.STOP 0x00000024: NTFS_FILE_SYSTEM
Usual causes: Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure
STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL
Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility
Since the hard drive is mentioned as a possible cause, lets check that.Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-20078-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82c00000 PsLoadedModuleList = 0x82d3f570 Debug session time: Sun Aug 8 09:02:21.997 2010 (GMT-4) System Uptime: 0 days 0:22:33.076 Loading Kernel Symbols ............................................................... ................................................................ .............. Loading User Symbols Loading unloaded module list ...... 1: kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, 92edd85c, 92edd440, 82cb8759} Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+13e ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 001904fb Arg2: 92edd85c Arg3: 92edd440 Arg4: 82cb8759 Debugging Details: ------------------ EXCEPTION_RECORD: 92edd85c -- (.exr 0xffffffff92edd85c) ExceptionAddress: 82cb8759 (nt!MmLocateSubsectionNode+0x0000000e) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 0000001d Attempt to read from address 0000001d CONTEXT: 92edd440 -- (.cxr 0xffffffff92edd440) eax=00000001 ebx=00001000 ecx=00000f0c edx=00000000 esi=9f995348 edi=00000001 eip=82cb8759 esp=92edd924 ebp=92edd938 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 nt!MmLocateSubsectionNode+0xe: 82cb8759 8b481c mov ecx,dword ptr [eax+1Ch] ds:0023:0000001d=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE PROCESS_NAME: mscorsvw.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 0000001d READ_ADDRESS: GetPointerFromAddress: unable to read from 82d5f700 Unable to read MiSystemVaType memory at 82d3f0c0 0000001d FOLLOWUP_IP: Ntfs!NtfsCachedRead+13e 86520c8b 84c0 test al,al FAULTING_IP: nt!MmLocateSubsectionNode+e 82cb8759 8b481c mov ecx,dword ptr [eax+1Ch] BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from 82e35a1f to 82cb8759 STACK_TEXT: 92edd938 82e35a1f 9f995348 00000000 00000000 nt!MmLocateSubsectionNode+0xe 92edd968 82ca1978 00000000 00000000 9fa3cbe8 nt!MmHardFaultBytesRequired+0x54 92edd99c 82e626ab 9fa2da68 00000001 92edda14 nt!CcFetchDataForRead+0x6c 92edd9dc 82e587bc 9fa2da68 00000000 00000000 nt!CcMapAndCopyFromCache+0x71 92edda18 86520c8b 9fa2da68 92edda5c 00000040 nt!CcCopyRead+0x107 92edda44 8651e541 95750bc0 9fa2da68 ae9d4e00 Ntfs!NtfsCachedRead+0x13e 92eddb20 86521bae 95750bc0 ae9d4e00 14b9a0eb Ntfs!NtfsCommonRead+0x11a1 92eddb90 82f236c3 8d46f020 ae9d4e00 00000000 Ntfs!NtfsFsdRead+0x279 92eddbb4 82c2eefb 00000000 ae9d4e00 8d46f020 nt!IovCallDriver+0x258 92eddbc8 864ca20c 8d5231c0 ae9d4e00 00000000 nt!IofCallDriver+0x1b 92eddbec 864ca3cb 92eddc0c 8d5231c0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa 92eddc24 82f236c3 8d5231c0 ae9d4e00 9fa2da68 fltmgr!FltpDispatch+0xc5 92eddc48 82c2eefb 00000000 ae9d4e00 8d5231c0 nt!IovCallDriver+0x258 92eddc5c 82e04287 ae9d4e00 ae9d4fd8 9fa2da68 nt!IofCallDriver+0x1b 92eddc7c 82e0516e 8d5231c0 9fa2da68 00000001 nt!IopSynchronousServiceTail+0x1f8 92eddd08 82c3579a 8d5231c0 ae9d4e00 00000000 nt!NtReadFile+0x644 92eddd08 772064f4 8d5231c0 ae9d4e00 00000000 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 00bfc9b8 00000000 00000000 00000000 00000000 0x772064f4 SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: Ntfs!NtfsCachedRead+13e FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45 STACK_COMMAND: .cxr 0xffffffff92edd440 ; kb FAILURE_BUCKET_ID: 0x24_VRF_Ntfs!NtfsCachedRead+13e BUCKET_ID: 0x24_VRF_Ntfs!NtfsCachedRead+13e Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-18796-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82c19000 PsLoadedModuleList = 0x82d58570 Debug session time: Sun Aug 8 08:12:13.322 2010 (GMT-4) System Uptime: 0 days 0:07:12.338 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {83fffff0, 2, 1, 82ca0962} Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+70 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 83fffff0, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82ca0962, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82d78700 Unable to read MiSystemVaType memory at 82d580c0 83fffff0 CURRENT_IRQL: 2 FAULTING_IP: nt!MiReplenishPageSlist+70 82ca0962 f00fba2900 lock bts dword ptr [ecx],0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: 80e1aa44 -- (.trap 0xffffffff80e1aa44) ErrCode = 00000002 eax=ffffffff ebx=00000001 ecx=83fffff0 edx=000000cd esi=83ffffe8 edi=85501c84 eip=82ca0962 esp=80e1aab8 ebp=80e1aad4 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246 nt!MiReplenishPageSlist+0x70: 82ca0962 f00fba2900 lock bts dword ptr [ecx],0 ds:0023:83fffff0=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82ca0962 to 82c51b5b STACK_TEXT: 80e1aa44 82ca0962 badb0d00 000000cd 82d47100 nt!KiTrap0E+0x2cf 80e1aad4 82c90bc3 82d79040 000000cd 00000003 nt!MiReplenishPageSlist+0x70 80e1ab28 82c8c008 000000cd 00000000 877223e8 nt!MiRemoveAnyPage+0x332 80e1ab50 82cc3802 000000c1 00000000 859da000 nt!MiGetPage+0x281 80e1abe0 82e66c14 859da000 00000001 006c8000 nt!MiPfPutPagesInTransition+0x3bb 80e1ac08 82ca997a 25648000 00000000 006c8000 nt!MmPrefetchForCacheManager+0x83 80e1aca8 82cacfdc 857efa70 b0ff5409 855f7430 nt!CcPerformReadAhead+0x19f 80e1ad00 82c74043 855f7430 00000000 8561bc08 nt!CcWorkerThread+0x18d 80e1ad50 82e00d16 00000000 b0ff5499 00000000 nt!ExpWorkerThread+0x10d 80e1ad90 82ca2159 82c73f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplenishPageSlist+70 82ca0962 f00fba2900 lock bts dword ptr [ecx],0 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiReplenishPageSlist+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbffc IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0xA_nt!MiReplenishPageSlist+70 BUCKET_ID: 0xA_nt!MiReplenishPageSlist+70 Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 8cb31000 8cb79000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 93838000 93892000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 93ad2000 93ae4000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 8cca3000 8ccac000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 93a8c000 93ac5000 amyd45ge amyd45ge.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9) 8cc77000 8cc80000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8cc80000 8cca3000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 93c21000 9420c000 atikmdag atikmdag.sys Tue Jul 06 21:34:15 2010 (4C33D997) 93a53000 93a8c000 atikmpag atikmpag.sys Tue Jul 06 21:15:23 2010 (4C33D52B) 8d315000 8d31c000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 93a12000 93a20000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8c89b000 8c8a3000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 99885000 9989e000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 992b0000 992ce000 cdd cdd.dll unavailable (00000000) 8d2cc000 8d2eb000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 8c8e5000 8c990000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 8d275000 8d29a000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 8c8a3000 8c8e5000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 8ce5e000 8cebb000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 93ac5000 93ad2000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 9af39000 9af46000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 93996000 939fa000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 939fa000 93a12000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 9398a000 93996000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 8d264000 8d275000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 9ac4d000 9ac66000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 9af51000 9af5a000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 9af46000 9af51000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 9af5a000 9af6b000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 9af6b000 9af75000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 9420c000 942c3000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:26:15 2009 (4A5BC297) 942c3000 942fc000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 8cce0000 8ccf1000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8ccac000 8cce0000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 8cec9000 8ced2000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8d232000 8d264000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D) 8d16c000 8d19d000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 83019000 83050000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 942fc000 9431b000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F) 8d3a9000 8d3f9000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892) 9af12000 9af25000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865) 9af25000 9af2b480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863) 9af07000 9af12000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868) 99800000 99885000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 8d22a000 8d232000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 943dc000 943f4000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 93a41000 93a53000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 93c00000 93c0d000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bc1000 80bc9000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 93b79000 93bad000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709) 8ce4b000 8ce5e000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 8cfc7000 8cfec000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468) 9af9b000 9afab000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 9af80000 9af9b000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 8c812000 8c88a000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21) 9af75000 9af80000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 93c0d000 93c1a000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 9af2e000 9af39000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8cc61000 8cc77000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 8d2eb000 8d30e000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E) 99b09000 99b11e00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C) 9989e000 998b0000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 998b0000 998d3000 mrxsmb mrxsmb.sys Mon Jul 13 19:14:24 2009 (4A5BBFD0) 998d3000 9990e000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA) 9990e000 99929000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5) 8d36e000 8d379000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8cb79000 8cb81000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 8ce20000 8ce4b000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 93980000 9398a000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 8d21a000 8d22a000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 8ced2000 8cf89000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 93afc000 93b07000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 93b07000 93b29000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 93800000 93811000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 938ea000 938f8000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 93892000 938c4000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 8cf89000 8cfc7000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 8d379000 8d387000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 93976000 93980000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 82c19000 83019000 nt ntkrnlmp.exe Mon Jul 13 19:15:08 2009 (4A5BBFFC) 8ccf1000 8ce20000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 8d30e000 8d315000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 938cb000 938ea000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 943c4000 943dc000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E) 8cbb6000 8cbc7000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 99929000 99930000 parvdm parvdm.sys Mon Jul 13 19:45:29 2009 (4A5BC719) 8cb8c000 8cbb6000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8cc4c000 8cc53000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 8cc53000 8cc61000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 8cebb000 8cec9000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 99930000 999c7000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 9ac1e000 9ac4d000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 8c88a000 8c89b000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 93ae4000 93afc000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 93b29000 93b41000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 93b41000 93b58000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 93b58000 93b6f000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 93935000 93976000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 93b6f000 93b79000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 8d356000 8d35e000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 8d35e000 8d366000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 8d366000 8d36e000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 8d1ed000 8d21a000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 9afab000 9afbe000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 9431b000 94360000 Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F) 9ac66000 9af06400 RTKVHDA RTKVHDA.sys Mon Aug 31 06:18:44 2009 (4A9BA384) 8cb0b000 8cb31000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733) 999c7000 999d1000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 943f4000 943fe000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717) 938f8000 93912000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D) 8d1e5000 8d1ed000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 8ca0f000 8cb02000 sptd sptd.sys Sun Oct 11 16:54:02 2009 (4AD245EA) 99ab8000 99b09000 srv srv.sys Mon Jul 13 19:15:10 2009 (4A5BBFFE) 99a69000 99ab8000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC) 999d1000 999f2000 srvnet srvnet.sys Mon Jul 13 19:14:45 2009 (4A5BBFE5) 943fe000 943ff380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8d023000 8d16c000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E) 999f2000 999ff000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 8d39e000 8d3a9000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 8d387000 8d39e000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 93925000 93935000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 99280000 99289000 TSDDD TSDDD.dll unavailable (00000000) 93a20000 93a41000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 99b12000 99b52000 udfs udfs.sys Mon Jul 13 19:14:09 2009 (4A5BBFC1) 93bad000 93bbb000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 9af2c000 9af2d700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 943b5000 943c4000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 93bbb000 93bff000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 94360000 9436a000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 9436a000 943b5000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 8cb81000 8cb8c000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 8d31c000 8d328000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8d328000 8d349000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 8d19d000 8d1a5380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 8cbc7000 8cbd7000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8cc01000 8cc4c000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 8d1a6000 8d1e5000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 93912000 93925000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 8d349000 8d356000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8c990000 8ca01000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 8ca01000 8ca0f000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 938c4000 938cb000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 99020000 9926a000 win32k win32k.sys unavailable (00000000) 8cb02000 8cb0b000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) Unloaded modules: 999ff000 99a69000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8d29a000 8d2a7000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 8d2a7000 8d2b2000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 8d2b2000 8d2bb000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 8d2bb000 8d2cc000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.
Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"
CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7)
Please post your results.
After checking your hard drive, lets test your RAM since one of the dumps pointed to memory corruption. Memory corruption can be caused by drivers, incompatible software and a number of other things. I want to eliminate defective RAM as a cause.
Download a copy of Memtest86+ - Advanced Memory Diagnostic Tool and burn the ISO to a CD using http://isorecorder.alexfeinman.com/W7. Boot from the CD, and leave it running for at least 7 passes. Errors will show up in red. Post back with your results.
here are results from chkdsk for all my partitions
c:
dCode:Log Name: Application Source: Microsoft-Windows-Wininit Date: 10.8.2010. 10:30:34 Event ID: 1001 Task Category: None Level: Information Keywords: Classic User: N/A Computer: kule-PC Description: Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. Windows will now check the disk. CHKDSK is verifying files (stage 1 of 5)... 56320 file records processed. File verification completed. 40 large file records processed. 0 bad file records processed. 2 EA records processed. 44 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 80212 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 56320 file SDs/SIDs processed. Cleaning up 186 unused index entries from index $SII of file 0x9. Cleaning up 186 unused index entries from index $SDH of file 0x9. Cleaning up 186 unused security descriptors. Security descriptor verification completed. 11947 data files processed. CHKDSK is verifying Usn Journal... 28433936 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 56304 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 6211322 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 40857599 KB total disk space. 15831168 KB in 43839 files. 29480 KB in 11948 indexes. 0 KB in bad sectors. 151659 KB in use by the system. 65536 KB occupied by the log file. 24845292 KB available on disk. 4096 bytes in each allocation unit. 10214399 total allocation units on disk. 6211323 allocation units available on disk. Internal Info: 00 dc 00 00 f6 d9 00 00 d2 a5 01 00 00 00 00 00 ................ 0d 01 00 00 2c 00 00 00 00 00 00 00 00 00 00 00 ....,........... 60 8f 46 00 50 01 45 00 88 19 45 00 00 00 45 00 `.F.P.E...E...E. Windows has finished checking your disk. Please wait while your computer restarts. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Microsoft-Windows-Wininit" Guid="{206f6dea-d3c5-4d10-bc72-989f03c8b84b}" EventSourceName="Wininit" /> <EventID Qualifiers="16384">1001</EventID> <Version>0</Version> <Level>4</Level> <Task>0</Task> <Opcode>0</Opcode> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2010-08-10T08:30:34.000000000Z" /> <EventRecordID>662</EventRecordID> <Correlation /> <Execution ProcessID="0" ThreadID="0" /> <Channel>Application</Channel> <Computer>kule-PC</Computer> <Security /> </System> <EventData> <Data> Checking file system on C: The type of the file system is NTFS. A disk check has been scheduled. Windows will now check the disk. CHKDSK is verifying files (stage 1 of 5)... 56320 file records processed. File verification completed. 40 large file records processed. 0 bad file records processed. 2 EA records processed. 44 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 80212 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 56320 file SDs/SIDs processed. Cleaning up 186 unused index entries from index $SII of file 0x9. Cleaning up 186 unused index entries from index $SDH of file 0x9. Cleaning up 186 unused security descriptors. Security descriptor verification completed. 11947 data files processed. CHKDSK is verifying Usn Journal... 28433936 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 56304 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 6211322 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 40857599 KB total disk space. 15831168 KB in 43839 files. 29480 KB in 11948 indexes. 0 KB in bad sectors. 151659 KB in use by the system. 65536 KB occupied by the log file. 24845292 KB available on disk. 4096 bytes in each allocation unit. 10214399 total allocation units on disk. 6211323 allocation units available on disk. Internal Info: 00 dc 00 00 f6 d9 00 00 d2 a5 01 00 00 00 00 00 ................ 0d 01 00 00 2c 00 00 00 00 00 00 00 00 00 00 00 ....,........... 60 8f 46 00 50 01 45 00 88 19 45 00 00 00 45 00 `.F.P.E...E...E. Windows has finished checking your disk. Please wait while your computer restarts. </Data> </EventData> </Event>
eCode:Log Name: Application Source: Chkdsk Date: 10.8.2010. 13:41:43 Event ID: 26214 Task Category: None Level: Information Keywords: Classic User: N/A Computer: kule-PC Description: Chkdsk was executed in read/write mode. Checking file system on D: The type of the file system is NTFS. Volume label is My Documents. CHKDSK is verifying files (stage 1 of 5)... 232704 file records processed. File verification completed. 578 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 268984 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 232704 file SDs/SIDs processed. Cleaning up 1277 unused index entries from index $SII of file 0x9. Cleaning up 1277 unused index entries from index $SDH of file 0x9. Cleaning up 1277 unused security descriptors. Security descriptor verification completed. 18141 data files processed. CHKDSK is verifying Usn Journal... 36355688 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 232688 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 9820333 free clusters processed. Free space verification is complete. CHKDSK discovered free space marked as allocated in the master file table (MFT) bitmap. CHKDSK discovered free space marked as allocated in the volume bitmap. Windows has made corrections to the file system. 312568831 KB total disk space. 272856584 KB in 187204 files. 86244 KB in 18142 indexes. 0 KB in bad sectors. 344667 KB in use by the system. 65536 KB occupied by the log file. 39281336 KB available on disk. 4096 bytes in each allocation unit. 78142207 total allocation units on disk. 9820334 allocation units available on disk. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Chkdsk" /> <EventID Qualifiers="0">26214</EventID> <Level>4</Level> <Task>0</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2010-08-10T11:41:43.000000000Z" /> <EventRecordID>667</EventRecordID> <Channel>Application</Channel> <Computer>kule-PC</Computer> <Security /> </System> <EventData> <Data> Checking file system on D: The type of the file system is NTFS. Volume label is My Documents. CHKDSK is verifying files (stage 1 of 5)... 232704 file records processed. File verification completed. 578 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 268984 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 232704 file SDs/SIDs processed. Cleaning up 1277 unused index entries from index $SII of file 0x9. Cleaning up 1277 unused index entries from index $SDH of file 0x9. Cleaning up 1277 unused security descriptors. Security descriptor verification completed. 18141 data files processed. CHKDSK is verifying Usn Journal... 36355688 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 232688 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 9820333 free clusters processed. Free space verification is complete. CHKDSK discovered free space marked as allocated in the master file table (MFT) bitmap. CHKDSK discovered free space marked as allocated in the volume bitmap. Windows has made corrections to the file system. 312568831 KB total disk space. 272856584 KB in 187204 files. 86244 KB in 18142 indexes. 0 KB in bad sectors. 344667 KB in use by the system. 65536 KB occupied by the log file. 39281336 KB available on disk. 4096 bytes in each allocation unit. 78142207 total allocation units on disk. 9820334 allocation units available on disk. </Data> <Binary>008D03002E2203001D6D050000000000DB210000000000000000000000000000</Binary> </EventData> </Event>
fCode:Log Name: Application Source: Chkdsk Date: 10.8.2010. 16:31:34 Event ID: 26214 Task Category: None Level: Information Keywords: Classic User: N/A Computer: kule-PC Description: Chkdsk was executed in read/write mode. Checking file system on E: The type of the file system is NTFS. Volume label is Local Disk. CHKDSK is verifying files (stage 1 of 5)... 25344 file records processed. File verification completed. 12 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 26000 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 25344 file SDs/SIDs processed. Security descriptor verification completed. 329 data files processed. CHKDSK is verifying Usn Journal... 36326648 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 25328 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 14576599 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 156280288 KB total disk space. 97839344 KB in 8002 files. 2600 KB in 330 indexes. 0 KB in bad sectors. 131944 KB in use by the system. 65536 KB occupied by the log file. 58306400 KB available on disk. 4096 bytes in each allocation unit. 39070072 total allocation units on disk. 14576600 allocation units available on disk. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Chkdsk" /> <EventID Qualifiers="0">26214</EventID> <Level>4</Level> <Task>0</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2010-08-10T14:31:34.000000000Z" /> <EventRecordID>672</EventRecordID> <Channel>Application</Channel> <Computer>kule-PC</Computer> <Security /> </System> <EventData> <Data> Checking file system on E: The type of the file system is NTFS. Volume label is Local Disk. CHKDSK is verifying files (stage 1 of 5)... 25344 file records processed. File verification completed. 12 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 26000 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 25344 file SDs/SIDs processed. Security descriptor verification completed. 329 data files processed. CHKDSK is verifying Usn Journal... 36326648 USN bytes processed. Usn Journal verification completed. CHKDSK is verifying file data (stage 4 of 5)... 25328 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 14576599 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 156280288 KB total disk space. 97839344 KB in 8002 files. 2600 KB in 330 indexes. 0 KB in bad sectors. 131944 KB in use by the system. 65536 KB occupied by the log file. 58306400 KB available on disk. 4096 bytes in each allocation unit. 39070072 total allocation units on disk. 14576600 allocation units available on disk. </Data> <Binary>00630000982000003A23000000000000A6000000000000000000000000000000</Binary> </EventData> </Event>
i have also run memtest for whole night, over 8 hours of testing and NO errors. btw here are my files again so you check out other stuff if you want. thanks :)Code:Log Name: Application Source: Chkdsk Date: 10.8.2010. 20:18:10 Event ID: 26214 Task Category: None Level: Information Keywords: Classic User: N/A Computer: kule-PC Description: Chkdsk was executed in read/write mode. Checking file system on F: The type of the file system is NTFS. CHKDSK is verifying files (stage 1 of 5)... 256 file records processed. File verification completed. 0 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 284 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 256 file SDs/SIDs processed. Cleaning up 7 unused index entries from index $SII of file 0x9. Cleaning up 7 unused index entries from index $SDH of file 0x9. Cleaning up 7 unused security descriptors. Security descriptor verification completed. 14 data files processed. CHKDSK is verifying file data (stage 4 of 5)... 240 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 9274914 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 37188607 KB total disk space. 21588 KB in 9 files. 20 KB in 16 indexes. 0 KB in bad sectors. 67339 KB in use by the system. 65536 KB occupied by the log file. 37099660 KB available on disk. 4096 bytes in each allocation unit. 9297151 total allocation units on disk. 9274915 allocation units available on disk. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Chkdsk" /> <EventID Qualifiers="0">26214</EventID> <Level>4</Level> <Task>0</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2010-08-10T18:18:10.000000000Z" /> <EventRecordID>674</EventRecordID> <Channel>Application</Channel> <Computer>kule-PC</Computer> <Security /> </System> <EventData> <Data> Checking file system on F: The type of the file system is NTFS. CHKDSK is verifying files (stage 1 of 5)... 256 file records processed. File verification completed. 0 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed. CHKDSK is verifying indexes (stage 2 of 5)... 284 index entries processed. Index verification completed. 0 unindexed files scanned. 0 unindexed files recovered. CHKDSK is verifying security descriptors (stage 3 of 5)... 256 file SDs/SIDs processed. Cleaning up 7 unused index entries from index $SII of file 0x9. Cleaning up 7 unused index entries from index $SDH of file 0x9. Cleaning up 7 unused security descriptors. Security descriptor verification completed. 14 data files processed. CHKDSK is verifying file data (stage 4 of 5)... 240 files processed. File data verification completed. CHKDSK is verifying free space (stage 5 of 5)... 9274914 free clusters processed. Free space verification is complete. Windows has checked the file system and found no problems. 37188607 KB total disk space. 21588 KB in 9 files. 20 KB in 16 indexes. 0 KB in bad sectors. 67339 KB in use by the system. 65536 KB occupied by the log file. 37099660 KB available on disk. 4096 bytes in each allocation unit. 9297151 total allocation units on disk. 9274915 allocation units available on disk. </Data> <Binary>0001000024000000260000000000000001000000000000000000000000000000</Binary> </EventData> </Event>
It looks like we have eliminated RAM and the hard drive as the sources of the problem. Did you completely uninstall Starcraft and ketro.exe? Have you gotten any new BSOD's in the last three days?
i have reformatted c: and reinstalled windows cause i didn't manage to remove that CD SIMULATOR driver whatever... now i updated my drivers and i didn't install any windows update whatsoever. 1 bsod (or 2??) since then, here are the files...