BSOD, help please

Page 4 of 15 FirstFirst ... 2345614 ... LastLast

  1. Posts : 74
    Windows 7 Ultimate x64
    Thread Starter
       #31

    i have turned off verifier, and run file check. it didn't find any errors again
      My Computer


  2. Posts : 74
    Windows 7 Ultimate x64
    Thread Starter
       #32

    i have new problem :S computer is freezing randomly once (twice?) per day but without any bsod :S sound stop working, keyboard is dead, only mouse is moving, but its not useful cause i cannot click anything. shall i turn on that driver verifier again?
      My Computer


  3. Posts : 13,354
    Windows 7 Professional x64
       #33

    I wonder if your Realtek Network drivers are the cause. Look on the computer manufacturer's site for an update.
      My Computer


  4. Posts : 74
    Windows 7 Ultimate x64
    Thread Starter
       #34

    BSOOOOOD! i have turned on driver verifier, and updated realtek network!
      My Computer


  5. Posts : 1,598
    Microsoft Window 7 Professional 32 bit
       #35

    Don't see much from the DMP, let's wait until driver verifier give us more result
    For now, Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: http://www.duplexsecure.com/en/downloads

    Code:
    BugCheck A, {83fffff0, 2, 1, 82ca0962}
    
    Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+70 )
    
    Followup: MachineOwner
    ---------
    PROCESS_NAME:  Keytro.exev<----??? CD key getting program??not ok
    BugCheck 24, {1904fb, 92edd85c, 92edd440, 82cb8759}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+13e )
    
    Followup: MachineOwner
    ---------
    Last edited by ttran; 08 Aug 2010 at 09:50.
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #36

    Hi, Kuleee. The Driver Verifier enabled dump points to Keytro.exe as the cause of the crash. This appears to be a game, Starcraft? It this is a cracked copy and ketro.exe is the keygen (as it appears to be), immediately uninstall the game and ketro.exe. I recommend that you download and use Revo (free) uninstaller for this. (1) ketro.exe is blamed for the crash and (2) we absolutely do not support piracy at Seven Forums. Cracked copies often cause system problems.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-20484-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82c19000 PsLoadedModuleList = 0x82d58570
    Debug session time: Sun Aug  8 08:39:20.495 2010 (GMT-4)
    System Uptime: 0 days 0:22:40.582
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {1, 2, 1, 8301c839}
    
    Probably caused by : win32k.sys ( win32k!GreAcquireSemaphore+16 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000001, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 8301c839, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WORKER_ROUTINE: 
    +54f7952f01ecdcf0
    00000001 ??              ???
    
    WORK_ITEM:  8301c839
    
    CURRENT_IRQL:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  Keytro.exe
    
    TRAP_FRAME:  a1d6e958 -- (.trap 0xffffffffa1d6e958)
    ErrCode = 00000002
    eax=a1d6e9f8 ebx=00000000 ecx=98ed7ac4 edx=00000001 esi=98ed7a90 edi=82d3ad20
    eip=8301c839 esp=a1d6e9cc ebp=a1d6ea10 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29:
    8301c839 8902            mov     dword ptr [edx],eax  ds:0023:00000001=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8301c839 to 82c51b5b
    
    STACK_TEXT:  
    a1d6e958 8301c839 badb0d00 00000001 00000000 nt!KiTrap0E+0x2cf
    a1d6e9c8 82c7ce5c 00000000 98ed7a90 86b481b0 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29
    a1d6ea10 82ccc621 98ed7a90 00000001 a1d6eb10 nt!ExAcquireResourceExclusiveLite+0xd4
    a1d6ea20 949abb6f 98ed7a90 86b4807e 94919c85 nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x1c
    a1d6ea2c 94919c85 86b4807e 00000000 86b481b0 win32k!GreAcquireSemaphore+0x16
    a1d6eb10 949196a2 a1d6ead0 ffffaa27 ff9ee670 win32k!DrvInternalChangeDisplaySettings+0x2ce
    a1d6ec2c 949f99af 00000000 ffb8f748 00248430 win32k!DrvChangeDisplaySettings+0x8fe
    a1d6ec88 949fa2ab 00000000 00248430 8d7cfd88 win32k!xxxInternalUserChangeDisplaySettings+0x247
    a1d6ecf8 949f9e07 00000000 00248430 00000000 win32k!xxxUserChangeDisplaySettings+0x67
    a1d6ed1c 82c4e79a 00000000 00248430 00000004 win32k!NtUserChangeDisplaySettings+0x60
    a1d6ed1c 77f064f4 00000000 00248430 00000004 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012fdb0 00000000 00000000 00000000 00000000 0x77f064f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!GreAcquireSemaphore+16
    949abb6f 5e              pop     esi
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32k!GreAcquireSemaphore+16
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2
    
    FAILURE_BUCKET_ID:  0xA_VRF_win32k!GreAcquireSemaphore+16
    
    BUCKET_ID:  0xA_VRF_win32k!GreAcquireSemaphore+16
    
    Followup: MachineOwner
    ---------
    Stop error code A means a hardware problem. Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.

    Ttran posted while I was typing. Follow his advice and uninstall sptd.sys as well as what I have suggested.
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #37

    Your other two dumps are not Driver Verifier enabled dumps. Here are the error codes:
    STOP 0x00000024: NTFS_FILE_SYSTEM

    Usual causes: Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure


    STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL

    Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility
    These are hardware or hardware related error codes. Notice what is in common in the two, drivers.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-20078-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82c00000 PsLoadedModuleList = 0x82d3f570
    Debug session time: Sun Aug  8 09:02:21.997 2010 (GMT-4)
    System Uptime: 0 days 0:22:33.076
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, 92edd85c, 92edd440, 82cb8759}
    
    Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+13e )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 001904fb
    Arg2: 92edd85c
    Arg3: 92edd440
    Arg4: 82cb8759
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  92edd85c -- (.exr 0xffffffff92edd85c)
    ExceptionAddress: 82cb8759 (nt!MmLocateSubsectionNode+0x0000000e)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 0000001d
    Attempt to read from address 0000001d
    
    CONTEXT:  92edd440 -- (.cxr 0xffffffff92edd440)
    eax=00000001 ebx=00001000 ecx=00000f0c edx=00000000 esi=9f995348 edi=00000001
    eip=82cb8759 esp=92edd924 ebp=92edd938 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!MmLocateSubsectionNode+0xe:
    82cb8759 8b481c          mov     ecx,dword ptr [eax+1Ch] ds:0023:0000001d=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    PROCESS_NAME:  mscorsvw.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  0000001d
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82d5f700
    Unable to read MiSystemVaType memory at 82d3f0c0
     0000001d 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCachedRead+13e
    86520c8b 84c0            test    al,al
    
    FAULTING_IP: 
    nt!MmLocateSubsectionNode+e
    82cb8759 8b481c          mov     ecx,dword ptr [eax+1Ch]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from 82e35a1f to 82cb8759
    
    STACK_TEXT:  
    92edd938 82e35a1f 9f995348 00000000 00000000 nt!MmLocateSubsectionNode+0xe
    92edd968 82ca1978 00000000 00000000 9fa3cbe8 nt!MmHardFaultBytesRequired+0x54
    92edd99c 82e626ab 9fa2da68 00000001 92edda14 nt!CcFetchDataForRead+0x6c
    92edd9dc 82e587bc 9fa2da68 00000000 00000000 nt!CcMapAndCopyFromCache+0x71
    92edda18 86520c8b 9fa2da68 92edda5c 00000040 nt!CcCopyRead+0x107
    92edda44 8651e541 95750bc0 9fa2da68 ae9d4e00 Ntfs!NtfsCachedRead+0x13e
    92eddb20 86521bae 95750bc0 ae9d4e00 14b9a0eb Ntfs!NtfsCommonRead+0x11a1
    92eddb90 82f236c3 8d46f020 ae9d4e00 00000000 Ntfs!NtfsFsdRead+0x279
    92eddbb4 82c2eefb 00000000 ae9d4e00 8d46f020 nt!IovCallDriver+0x258
    92eddbc8 864ca20c 8d5231c0 ae9d4e00 00000000 nt!IofCallDriver+0x1b
    92eddbec 864ca3cb 92eddc0c 8d5231c0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    92eddc24 82f236c3 8d5231c0 ae9d4e00 9fa2da68 fltmgr!FltpDispatch+0xc5
    92eddc48 82c2eefb 00000000 ae9d4e00 8d5231c0 nt!IovCallDriver+0x258
    92eddc5c 82e04287 ae9d4e00 ae9d4fd8 9fa2da68 nt!IofCallDriver+0x1b
    92eddc7c 82e0516e 8d5231c0 9fa2da68 00000001 nt!IopSynchronousServiceTail+0x1f8
    92eddd08 82c3579a 8d5231c0 ae9d4e00 00000000 nt!NtReadFile+0x644
    92eddd08 772064f4 8d5231c0 ae9d4e00 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00bfc9b8 00000000 00000000 00000000 00000000 0x772064f4
    
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  Ntfs!NtfsCachedRead+13e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff92edd440 ; kb
    
    FAILURE_BUCKET_ID:  0x24_VRF_Ntfs!NtfsCachedRead+13e
    
    BUCKET_ID:  0x24_VRF_Ntfs!NtfsCachedRead+13e
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\Windows7_BSOD_jcgriff2\080810-18796-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82c19000 PsLoadedModuleList = 0x82d58570
    Debug session time: Sun Aug  8 08:12:13.322 2010 (GMT-4)
    System Uptime: 0 days 0:07:12.338
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {83fffff0, 2, 1, 82ca0962}
    
    Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+70 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 83fffff0, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82ca0962, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82d78700
    Unable to read MiSystemVaType memory at 82d580c0
     83fffff0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReplenishPageSlist+70
    82ca0962 f00fba2900      lock bts dword ptr [ecx],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  80e1aa44 -- (.trap 0xffffffff80e1aa44)
    ErrCode = 00000002
    eax=ffffffff ebx=00000001 ecx=83fffff0 edx=000000cd esi=83ffffe8 edi=85501c84
    eip=82ca0962 esp=80e1aab8 ebp=80e1aad4 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00210246
    nt!MiReplenishPageSlist+0x70:
    82ca0962 f00fba2900      lock bts dword ptr [ecx],0   ds:0023:83fffff0=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82ca0962 to 82c51b5b
    
    STACK_TEXT:  
    80e1aa44 82ca0962 badb0d00 000000cd 82d47100 nt!KiTrap0E+0x2cf
    80e1aad4 82c90bc3 82d79040 000000cd 00000003 nt!MiReplenishPageSlist+0x70
    80e1ab28 82c8c008 000000cd 00000000 877223e8 nt!MiRemoveAnyPage+0x332
    80e1ab50 82cc3802 000000c1 00000000 859da000 nt!MiGetPage+0x281
    80e1abe0 82e66c14 859da000 00000001 006c8000 nt!MiPfPutPagesInTransition+0x3bb
    80e1ac08 82ca997a 25648000 00000000 006c8000 nt!MmPrefetchForCacheManager+0x83
    80e1aca8 82cacfdc 857efa70 b0ff5409 855f7430 nt!CcPerformReadAhead+0x19f
    80e1ad00 82c74043 855f7430 00000000 8561bc08 nt!CcWorkerThread+0x18d
    80e1ad50 82e00d16 00000000 b0ff5499 00000000 nt!ExpWorkerThread+0x10d
    80e1ad90 82ca2159 82c73f36 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReplenishPageSlist+70
    82ca0962 f00fba2900      lock bts dword ptr [ecx],0
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiReplenishPageSlist+70
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbffc
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0xA_nt!MiReplenishPageSlist+70
    
    BUCKET_ID:  0xA_nt!MiReplenishPageSlist+70
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmtsmn
    start    end        module name
    8cb31000 8cb79000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    93838000 93892000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    93ad2000 93ae4000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8cca3000 8ccac000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    93a8c000 93ac5000   amyd45ge amyd45ge.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
    8cc77000 8cc80000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8cc80000 8cca3000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    93c21000 9420c000   atikmdag atikmdag.sys Tue Jul 06 21:34:15 2010 (4C33D997)
    93a53000 93a8c000   atikmpag atikmpag.sys Tue Jul 06 21:15:23 2010 (4C33D52B)
    8d315000 8d31c000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    93a12000 93a20000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    8c89b000 8c8a3000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    99885000 9989e000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    992b0000 992ce000   cdd      cdd.dll      unavailable (00000000)
    8d2cc000 8d2eb000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    8c8e5000 8c990000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    8d275000 8d29a000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    8c8a3000 8c8e5000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8ce5e000 8cebb000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    93ac5000 93ad2000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    9af39000 9af46000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    93996000 939fa000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    939fa000 93a12000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    9398a000 93996000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8d264000 8d275000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    9ac4d000 9ac66000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    9af51000 9af5a000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9af46000 9af51000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    9af5a000 9af6b000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    9af6b000 9af75000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    9420c000 942c3000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
    942c3000 942fc000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8cce0000 8ccf1000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8ccac000 8cce0000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8cec9000 8ced2000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8d232000 8d264000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
    8d16c000 8d19d000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    83019000 83050000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    942fc000 9431b000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    8d3a9000 8d3f9000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    9af12000 9af25000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    9af25000 9af2b480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    9af07000 9af12000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    99800000 99885000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8d22a000 8d232000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    943dc000 943f4000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    93a41000 93a53000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    93c00000 93c0d000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80bc1000 80bc9000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    93b79000 93bad000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8ce4b000 8ce5e000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8cfc7000 8cfec000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
    9af9b000 9afab000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    9af80000 9af9b000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    8c812000 8c88a000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    9af75000 9af80000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    93c0d000 93c1a000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    9af2e000 9af39000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8cc61000 8cc77000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    8d2eb000 8d30e000   MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
    99b09000 99b11e00   MpNWMon  MpNWMon.sys  Sat Mar 20 00:03:24 2010 (4BA4490C)
    9989e000 998b0000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    998b0000 998d3000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:14:24 2009 (4A5BBFD0)
    998d3000 9990e000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
    9990e000 99929000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
    8d36e000 8d379000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8cb79000 8cb81000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8ce20000 8ce4b000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    93980000 9398a000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8d21a000 8d22a000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8ced2000 8cf89000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    93afc000 93b07000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    93b07000 93b29000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    93800000 93811000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    938ea000 938f8000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    93892000 938c4000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    8cf89000 8cfc7000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    8d379000 8d387000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    93976000 93980000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82c19000 83019000   nt       ntkrnlmp.exe Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    8ccf1000 8ce20000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    8d30e000 8d315000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    938cb000 938ea000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    943c4000 943dc000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
    8cbb6000 8cbc7000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    99929000 99930000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
    8cb8c000 8cbb6000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8cc4c000 8cc53000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8cc53000 8cc61000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8cebb000 8cec9000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    99930000 999c7000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    9ac1e000 9ac4d000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    8c88a000 8c89b000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    93ae4000 93afc000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    93b29000 93b41000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    93b41000 93b58000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    93b58000 93b6f000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    93935000 93976000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    93b6f000 93b79000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    8d356000 8d35e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    8d35e000 8d366000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    8d366000 8d36e000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8d1ed000 8d21a000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    9afab000 9afbe000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    9431b000 94360000   Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F)
    9ac66000 9af06400   RTKVHDA  RTKVHDA.sys  Mon Aug 31 06:18:44 2009 (4A9BA384)
    8cb0b000 8cb31000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
    999c7000 999d1000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    943f4000 943fe000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    938f8000 93912000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    8d1e5000 8d1ed000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    8ca0f000 8cb02000   sptd     sptd.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
    99ab8000 99b09000   srv      srv.sys      Mon Jul 13 19:15:10 2009 (4A5BBFFE)
    99a69000 99ab8000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
    999d1000 999f2000   srvnet   srvnet.sys   Mon Jul 13 19:14:45 2009 (4A5BBFE5)
    943fe000 943ff380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8d023000 8d16c000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
    999f2000 999ff000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8d39e000 8d3a9000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    8d387000 8d39e000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    93925000 93935000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    99280000 99289000   TSDDD    TSDDD.dll    unavailable (00000000)
    93a20000 93a41000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    99b12000 99b52000   udfs     udfs.sys     Mon Jul 13 19:14:09 2009 (4A5BBFC1)
    93bad000 93bbb000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    9af2c000 9af2d700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    943b5000 943c4000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    93bbb000 93bff000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    94360000 9436a000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    9436a000 943b5000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8cb81000 8cb8c000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    8d31c000 8d328000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    8d328000 8d349000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8d19d000 8d1a5380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    8cbc7000 8cbd7000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8cc01000 8cc4c000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8d1a6000 8d1e5000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    93912000 93925000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    8d349000 8d356000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8c990000 8ca01000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8ca01000 8ca0f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    938c4000 938cb000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    99020000 9926a000   win32k   win32k.sys   unavailable (00000000)
    8cb02000 8cb0b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    
    Unloaded modules:
    999ff000 99a69000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8d29a000 8d2a7000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8d2a7000 8d2b2000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8d2b2000 8d2bb000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8d2bb000 8d2cc000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    Since the hard drive is mentioned as a possible cause, lets check that.

    Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
    When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.

    Elevated Command Prompt:
    Go to Start and type in "cmd.exe" (without the quotes)
    At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"

    CHKDSK LogFile:
    Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
    Expand the Windows logs heading, then select the Application log file entry.
    Double click on the Source column header.
    Scroll down the list until you find the Chkdsk entry (wininit for Windows 7)

    Please post your results.

    After checking your hard drive, lets test your RAM since one of the dumps pointed to memory corruption. Memory corruption can be caused by drivers, incompatible software and a number of other things. I want to eliminate defective RAM as a cause.

    Download a copy of Memtest86+ - Advanced Memory Diagnostic Tool and burn the ISO to a CD using http://isorecorder.alexfeinman.com/W7. Boot from the CD, and leave it running for at least 7 passes. Errors will show up in red. Post back with your results.





      My Computer


  8. Posts : 74
    Windows 7 Ultimate x64
    Thread Starter
       #38

    here are results from chkdsk for all my partitions

    c:

    Code:
    Log Name:      Application
    Source:        Microsoft-Windows-Wininit
    Date:          10.8.2010. 10:30:34
    Event ID:      1001
    Task Category: None
    Level:         Information
    Keywords:      Classic
    User:          N/A
    Computer:      kule-PC
    Description:
    
    
    Checking file system on C:
    The type of the file system is NTFS.
    
    A disk check has been scheduled.
    Windows will now check the disk.                         
    
    CHKDSK is verifying files (stage 1 of 5)...
      56320 file records processed.                                         
    
    File verification completed.
      40 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      2 EA records processed.                                           
    
      44 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      80212 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      56320 file SDs/SIDs processed.                                        
    
    Cleaning up 186 unused index entries from index $SII of file 0x9.
    Cleaning up 186 unused index entries from index $SDH of file 0x9.
    Cleaning up 186 unused security descriptors.
    Security descriptor verification completed.
      11947 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      28433936 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      56304 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      6211322 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
      40857599 KB total disk space.
      15831168 KB in 43839 files.
         29480 KB in 11948 indexes.
             0 KB in bad sectors.
        151659 KB in use by the system.
         65536 KB occupied by the log file.
      24845292 KB available on disk.
    
          4096 bytes in each allocation unit.
      10214399 total allocation units on disk.
       6211323 allocation units available on disk.
    
    Internal Info:
    00 dc 00 00 f6 d9 00 00 d2 a5 01 00 00 00 00 00  ................
    0d 01 00 00 2c 00 00 00 00 00 00 00 00 00 00 00  ....,...........
    60 8f 46 00 50 01 45 00 88 19 45 00 00 00 45 00  `.F.P.E...E...E.
    
    Windows has finished checking your disk.
    Please wait while your computer restarts.
    
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Microsoft-Windows-Wininit" Guid="{206f6dea-d3c5-4d10-bc72-989f03c8b84b}" EventSourceName="Wininit" />
        <EventID Qualifiers="16384">1001</EventID>
        <Version>0</Version>
        <Level>4</Level>
        <Task>0</Task>
        <Opcode>0</Opcode>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2010-08-10T08:30:34.000000000Z" />
        <EventRecordID>662</EventRecordID>
        <Correlation />
        <Execution ProcessID="0" ThreadID="0" />
        <Channel>Application</Channel>
        <Computer>kule-PC</Computer>
        <Security />
      </System>
      <EventData>
        <Data>
    
    Checking file system on C:
    The type of the file system is NTFS.
    
    A disk check has been scheduled.
    Windows will now check the disk.                         
    
    CHKDSK is verifying files (stage 1 of 5)...
      56320 file records processed.                                         
    
    File verification completed.
      40 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      2 EA records processed.                                           
    
      44 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      80212 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      56320 file SDs/SIDs processed.                                        
    
    Cleaning up 186 unused index entries from index $SII of file 0x9.
    Cleaning up 186 unused index entries from index $SDH of file 0x9.
    Cleaning up 186 unused security descriptors.
    Security descriptor verification completed.
      11947 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      28433936 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      56304 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      6211322 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
      40857599 KB total disk space.
      15831168 KB in 43839 files.
         29480 KB in 11948 indexes.
             0 KB in bad sectors.
        151659 KB in use by the system.
         65536 KB occupied by the log file.
      24845292 KB available on disk.
    
          4096 bytes in each allocation unit.
      10214399 total allocation units on disk.
       6211323 allocation units available on disk.
    
    Internal Info:
    00 dc 00 00 f6 d9 00 00 d2 a5 01 00 00 00 00 00  ................
    0d 01 00 00 2c 00 00 00 00 00 00 00 00 00 00 00  ....,...........
    60 8f 46 00 50 01 45 00 88 19 45 00 00 00 45 00  `.F.P.E...E...E.
    
    Windows has finished checking your disk.
    Please wait while your computer restarts.
    </Data>
      </EventData>
    </Event>
    d

    Code:
    Log Name:      Application
    Source:        Chkdsk
    Date:          10.8.2010. 13:41:43
    Event ID:      26214
    Task Category: None
    Level:         Information
    Keywords:      Classic
    User:          N/A
    Computer:      kule-PC
    Description:
    Chkdsk was executed in read/write mode.  
    
    Checking file system on D:
    The type of the file system is NTFS.
    Volume label is My Documents.
    
    CHKDSK is verifying files (stage 1 of 5)...
      232704 file records processed.                                         
    
    File verification completed.
      578 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      268984 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      232704 file SDs/SIDs processed.                                        
    
    Cleaning up 1277 unused index entries from index $SII of file 0x9.
    Cleaning up 1277 unused index entries from index $SDH of file 0x9.
    Cleaning up 1277 unused security descriptors.
    Security descriptor verification completed.
      18141 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      36355688 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      232688 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      9820333 free clusters processed.                                        
    
    Free space verification is complete.
    CHKDSK discovered free space marked as allocated in the
    master file table (MFT) bitmap.
    CHKDSK discovered free space marked as allocated in the volume bitmap.
    Windows has made corrections to the file system.
    
     312568831 KB total disk space.
     272856584 KB in 187204 files.
         86244 KB in 18142 indexes.
             0 KB in bad sectors.
        344667 KB in use by the system.
         65536 KB occupied by the log file.
      39281336 KB available on disk.
    
          4096 bytes in each allocation unit.
      78142207 total allocation units on disk.
       9820334 allocation units available on disk.
    
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Chkdsk" />
        <EventID Qualifiers="0">26214</EventID>
        <Level>4</Level>
        <Task>0</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2010-08-10T11:41:43.000000000Z" />
        <EventRecordID>667</EventRecordID>
        <Channel>Application</Channel>
        <Computer>kule-PC</Computer>
        <Security />
      </System>
      <EventData>
        <Data>
    
    Checking file system on D:
    The type of the file system is NTFS.
    Volume label is My Documents.
    
    CHKDSK is verifying files (stage 1 of 5)...
      232704 file records processed.                                         
    
    File verification completed.
      578 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      268984 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      232704 file SDs/SIDs processed.                                        
    
    Cleaning up 1277 unused index entries from index $SII of file 0x9.
    Cleaning up 1277 unused index entries from index $SDH of file 0x9.
    Cleaning up 1277 unused security descriptors.
    Security descriptor verification completed.
      18141 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      36355688 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      232688 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      9820333 free clusters processed.                                        
    
    Free space verification is complete.
    CHKDSK discovered free space marked as allocated in the
    master file table (MFT) bitmap.
    CHKDSK discovered free space marked as allocated in the volume bitmap.
    Windows has made corrections to the file system.
    
     312568831 KB total disk space.
     272856584 KB in 187204 files.
         86244 KB in 18142 indexes.
             0 KB in bad sectors.
        344667 KB in use by the system.
         65536 KB occupied by the log file.
      39281336 KB available on disk.
    
          4096 bytes in each allocation unit.
      78142207 total allocation units on disk.
       9820334 allocation units available on disk.
    </Data>
        <Binary>008D03002E2203001D6D050000000000DB210000000000000000000000000000</Binary>
      </EventData>
    </Event>
    e

    Code:
    Log Name:      Application
    Source:        Chkdsk
    Date:          10.8.2010. 16:31:34
    Event ID:      26214
    Task Category: None
    Level:         Information
    Keywords:      Classic
    User:          N/A
    Computer:      kule-PC
    Description:
    Chkdsk was executed in read/write mode.  
    
    Checking file system on E:
    The type of the file system is NTFS.
    Volume label is Local Disk.
    
    CHKDSK is verifying files (stage 1 of 5)...
      25344 file records processed.                                         
    
    File verification completed.
      12 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      26000 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      25344 file SDs/SIDs processed.                                        
    
    Security descriptor verification completed.
      329 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      36326648 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      25328 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      14576599 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
     156280288 KB total disk space.
      97839344 KB in 8002 files.
          2600 KB in 330 indexes.
             0 KB in bad sectors.
        131944 KB in use by the system.
         65536 KB occupied by the log file.
      58306400 KB available on disk.
    
          4096 bytes in each allocation unit.
      39070072 total allocation units on disk.
      14576600 allocation units available on disk.
    
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Chkdsk" />
        <EventID Qualifiers="0">26214</EventID>
        <Level>4</Level>
        <Task>0</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2010-08-10T14:31:34.000000000Z" />
        <EventRecordID>672</EventRecordID>
        <Channel>Application</Channel>
        <Computer>kule-PC</Computer>
        <Security />
      </System>
      <EventData>
        <Data>
    
    Checking file system on E:
    The type of the file system is NTFS.
    Volume label is Local Disk.
    
    CHKDSK is verifying files (stage 1 of 5)...
      25344 file records processed.                                         
    
    File verification completed.
      12 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      26000 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      25344 file SDs/SIDs processed.                                        
    
    Security descriptor verification completed.
      329 data files processed.                                           
    
    CHKDSK is verifying Usn Journal...
      36326648 USN bytes processed.                                            
    
    Usn Journal verification completed.
    CHKDSK is verifying file data (stage 4 of 5)...
      25328 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      14576599 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
     156280288 KB total disk space.
      97839344 KB in 8002 files.
          2600 KB in 330 indexes.
             0 KB in bad sectors.
        131944 KB in use by the system.
         65536 KB occupied by the log file.
      58306400 KB available on disk.
    
          4096 bytes in each allocation unit.
      39070072 total allocation units on disk.
      14576600 allocation units available on disk.
    </Data>
        <Binary>00630000982000003A23000000000000A6000000000000000000000000000000</Binary>
      </EventData>
    </Event>
    f

    Code:
    Log Name:      Application
    Source:        Chkdsk
    Date:          10.8.2010. 20:18:10
    Event ID:      26214
    Task Category: None
    Level:         Information
    Keywords:      Classic
    User:          N/A
    Computer:      kule-PC
    Description:
    Chkdsk was executed in read/write mode.  
    
    Checking file system on F:
    The type of the file system is NTFS.
    
    CHKDSK is verifying files (stage 1 of 5)...
      256 file records processed.                                         
    
    File verification completed.
      0 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      284 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      256 file SDs/SIDs processed.                                        
    
    Cleaning up 7 unused index entries from index $SII of file 0x9.
    Cleaning up 7 unused index entries from index $SDH of file 0x9.
    Cleaning up 7 unused security descriptors.
    Security descriptor verification completed.
      14 data files processed.                                           
    
    CHKDSK is verifying file data (stage 4 of 5)...
      240 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      9274914 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
      37188607 KB total disk space.
         21588 KB in 9 files.
            20 KB in 16 indexes.
             0 KB in bad sectors.
         67339 KB in use by the system.
         65536 KB occupied by the log file.
      37099660 KB available on disk.
    
          4096 bytes in each allocation unit.
       9297151 total allocation units on disk.
       9274915 allocation units available on disk.
    
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Chkdsk" />
        <EventID Qualifiers="0">26214</EventID>
        <Level>4</Level>
        <Task>0</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2010-08-10T18:18:10.000000000Z" />
        <EventRecordID>674</EventRecordID>
        <Channel>Application</Channel>
        <Computer>kule-PC</Computer>
        <Security />
      </System>
      <EventData>
        <Data>
    
    Checking file system on F:
    The type of the file system is NTFS.
    
    CHKDSK is verifying files (stage 1 of 5)...
      256 file records processed.                                         
    
    File verification completed.
      0 large file records processed.                                   
    
      0 bad file records processed.                                     
    
      0 EA records processed.                                           
    
      0 reparse records processed.                                      
    
    CHKDSK is verifying indexes (stage 2 of 5)...
      284 index entries processed.                                        
    
    Index verification completed.
      0 unindexed files scanned.                                        
    
      0 unindexed files recovered.                                      
    
    CHKDSK is verifying security descriptors (stage 3 of 5)...
      256 file SDs/SIDs processed.                                        
    
    Cleaning up 7 unused index entries from index $SII of file 0x9.
    Cleaning up 7 unused index entries from index $SDH of file 0x9.
    Cleaning up 7 unused security descriptors.
    Security descriptor verification completed.
      14 data files processed.                                           
    
    CHKDSK is verifying file data (stage 4 of 5)...
      240 files processed.                                                
    
    File data verification completed.
    CHKDSK is verifying free space (stage 5 of 5)...
      9274914 free clusters processed.                                        
    
    Free space verification is complete.
    Windows has checked the file system and found no problems.
    
      37188607 KB total disk space.
         21588 KB in 9 files.
            20 KB in 16 indexes.
             0 KB in bad sectors.
         67339 KB in use by the system.
         65536 KB occupied by the log file.
      37099660 KB available on disk.
    
          4096 bytes in each allocation unit.
       9297151 total allocation units on disk.
       9274915 allocation units available on disk.
    </Data>
        <Binary>0001000024000000260000000000000001000000000000000000000000000000</Binary>
      </EventData>
    </Event>
    i have also run memtest for whole night, over 8 hours of testing and NO errors. btw here are my files again so you check out other stuff if you want. thanks :)
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #39

    It looks like we have eliminated RAM and the hard drive as the sources of the problem. Did you completely uninstall Starcraft and ketro.exe? Have you gotten any new BSOD's in the last three days?
      My Computer


  10. Posts : 74
    Windows 7 Ultimate x64
    Thread Starter
       #40

    i have reformatted c: and reinstalled windows cause i didn't manage to remove that CD SIMULATOR driver whatever... now i updated my drivers and i didn't install any windows update whatsoever. 1 bsod (or 2??) since then, here are the files...
      My Computer


 
Page 4 of 15 FirstFirst ... 2345614 ... LastLast

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 00:27.
Find Us