Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD's started recently


27 Oct 2010   #1

Win 7 Professional 64-bit
 
 
BSOD's started recently

Is Windows 7 . . .
- x86 (32-bit) or x64 ? : 64 Professional
- the original installed OS on the system?: No
- an OEM or full retail version?: Retail

- What is the age of system (hardware)?: 7 months
- What is the age of OS installation (have you re-installed the OS?) 7 months

Additional Info
BSOD's started roughly week ago, when I replaced my CPU Fan (CoolIT ECO A.L.C. Liquid cooling system) with the same model.
I had very few bsods before that.




My System SpecsSystem Spec
.

27 Oct 2010   #2

Windows 7 Ultimate 32 bit
 
 

You have a number of dump files. I looked at your five dumps from today. Please review the usual causes in each of the error codes.
Quote:
Error code F7, DRIVER_OVERRAN_STACK_BUFFER. Usual causes: Device driver, Malware.

Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Error code 24 (2X), NTFS_FILE_SYSTEM. Usual causes: Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure.

Error code 1A, MEMORY_MANAGEMENT. Usual causes: Device driver, memory, kernel.
To get started with troubleshooting, I suggest you uninstall Daemon Tools. One of your dumps directly blames sptd.sys for the crash.
Quote:
Please uninstall any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dump, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads. Select delete; do not select reinstall.
Here is an alternative virtualization program that does not user the sptd.sys driver:

Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview


Also, please download and install Malwarebytes, update it and do a quick scan. If it finds malware, do a thorough scan. One of the dumps indicates a possible malware attack.

You have another know BSOD maker on your system. Uninstall Zone Alarm using this uninstall tool:
http://download.zonealarm.com/bin/fr...cpes_clean.exe. ZA is a known cause of BSOD's on many Win 7 systems. Make sure Windows Firewall is turned on after uninstalling ZA.

I find two outdated drivers loaded on your system. Older drivers can and do cause memory corruption and BSOD's. Up date these drivers.
Quote:
iaStorV.sys Wed Apr 08 12:57:17 2009 - Intel Matrix Storage Manager driver (base)http://downloadcenter.intel.com/Default.aspx

netr28x.sys Fri Jun 19 03:56:06 2009 -
Ralink RT2860 series Wireless LAN Card (you may have a different manufacturer)Ralink corp.
How to find drivers -
Quote:
- I have listed links to most of the drivers in the code box below. Please use the links there to see what info I've found about those drivers.
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.


- - The most common drivers are listed on this page: Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads


Because of two instances of error 24, I recommend that you run Check Disk:
Quote:
Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.

Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"

CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7)


Follow the suggestions above, reboot and let's see how your system does. If you get another BSOD, please upload it to us.
Code:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0305a000 PsLoadedModuleList = 0xfffff800`03297e50
Debug session time: Wed Oct 27 02:42:54.998 2010 (GMT-4)
System Uptime: 0 days 0:01:41.138
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F7, {f8800147e04b, 2f2500018dd4000, e40300884101, 0}

Probably caused by : Ntfs.sys ( Ntfs!_report_gsfailure+26 )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000f8800147e04b, Actual security check cookie from the stack
Arg2: 02f2500018dd4000, Expected security check cookie
Arg3: 0000e40300884101, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


DEFAULT_BUCKET_ID:  GS_FALSE_POSITIVE_MISSING_GSFRAME

SECURITY_COOKIE:  Expected 02f2500018dd4000 found 0000f8800147e04b

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0xF7

PROCESS_NAME:  autochk.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88001442156 to fffff800030ca740

STACK_TEXT:  
fffff880`06705868 fffff880`01442156 : 00000000`000000f7 0000f880`0147e04b 02f25000`18dd4000 0000e403`00884101 : nt!KeBugCheckEx
fffff880`06705870 fffff880`01435094 : fffffa80`08d53d40 fffffa80`0891eb30 fffff880`06705801 fffffa80`08c50c00 : Ntfs!_report_gsfailure+0x26
fffff880`067058b0 fffff880`00e1d23f : fffffa80`0891ee88 fffffa80`0891eb30 fffffa80`08c50c30 00000000`00000000 : Ntfs!NtfsFsdRead+0x2d4
fffff880`06705960 fffff880`00e1b6df : fffffa80`08946d60 00000000`00000001 fffffa80`08946d00 fffffa80`0891eb30 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`067059f0 fffff800`033e0ca9 : 00000000`00000000 fffffa80`09d503a0 00000000`00000001 fffffa80`0891eb30 : fltmgr!FltpDispatch+0xcf
fffff880`06705a50 fffff800`033e84a3 : fffffa80`09d503a0 fffffa80`09d503a0 fffffa80`09d503a0 fffff880`033db180 : nt!IopSynchronousServiceTail+0xf9
fffff880`06705ac0 fffff800`030c9993 : 00000000`00001695 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`06705bb0 00000000`773cfdba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0021b898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773cfdba


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!_report_gsfailure+26
fffff880`01442156 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!_report_gsfailure+26

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0xF7_MISSING_GSFRAME_Ntfs!_report_gsfailure+26

BUCKET_ID:  X64_0xF7_MISSING_GSFRAME_Ntfs!_report_gsfailure+26

Followup: MachineOwner
---------

8: kd> lmtsmn
start             end                 module name
fffff880`0538f000 fffff880`053cd000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`011a0000 fffff880`011f7000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04033000 fffff880`040bd000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0525e000 fffff880`05274000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`013e8000 fffff880`013f3000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`053cd000 fffff880`053d5000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`042fe000 fffff880`04304000   AsIO     AsIO.sys     Mon Aug 03 03:03:16 2009 (4A768BB4)
fffff880`013b5000 fffff880`013be000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`013be000 fffff880`013e8000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`05200000 fffff880`05245000   av8pb1h3 av8pb1h3.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`02fc6000 fffff880`02fcd000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042ed000 fffff880`042fe000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02f9c000 fffff880`02fc6000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d2d000 fffff880`00ded000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01600000 fffff880`01630000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ccf000 fffff880`00d2d000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01687000 fffff880`016fa000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0524e000 fffff880`0525e000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`01630000 fffff880`0163e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0424c000 fffff880`042cf000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`042cf000 fffff880`042ed000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`04fd7000 fffff880`04fe6000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`017dd000 fffff880`017f3000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`06806000 fffff880`0680f000   DisplayLinkUsbPort_5_2_24075_0 DisplayLinkUsbPort_5.2.24075.0.sys Tue Mar 23 08:06:16 2010 (4BA8AEB8)
fffff880`10d36000 fffff880`10d81000   dlkmd    dlkmd.sys    Wed Feb 24 07:52:15 2010 (4B8520FF)
fffff880`017d5000 fffff880`017dd000   dlkmdldr dlkmdldr.sys Thu Aug 27 22:41:52 2009 (4A9743F0)
fffff880`05b4b000 fffff880`05b6d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02f89000 fffff880`02f9c000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02e6b000 fffff880`02f89000   dump_iaStorV dump_iaStorV.sys Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`050d8000 fffff880`051cc000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`05000000 fffff880`05046000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00e66000 fffff880`00e7a000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00e1a000 fffff880`00e66000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0170b000 fffff880`01715000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0179b000 fffff880`017d5000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01800000 fffff880`0184a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`053d5000 fffff880`053e2000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03011000 fffff800`0305a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`051cc000 fffff880`051f0000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05b98000 fffff880`05bb1000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05bb1000 fffff880`05bb9080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05b8a000 fffff880`05b98000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`019f4000 fffff880`019fd000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01297000 fffff880`013b5000   iaStorV  iaStorV.sys  Wed Apr 08 12:57:17 2009 (49DCD76D)
fffff880`0432a000 fffff880`04340000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`051f0000 fffff880`051ff000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05bba000 fffff880`05bc8000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b9e000 fffff800`00ba8000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`05bc8000 fffff880`05bed000   keyscrambler keyscrambler.sys Thu Feb 11 10:04:33 2010 (4B741C81)
fffff880`04a52000 fffff880`04f7b000   kl1      kl1.sys      Fri Sep 25 09:59:13 2009 (4ABCCCB1)
fffff880`02e00000 fffff880`02e5c000   klif     klif.sys     Tue Sep 22 06:31:19 2009 (4AB8A777)
fffff880`04200000 fffff880`04243000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`015c6000 fffff880`015e0000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`019af000 fffff880`019da000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`06800000 fffff880`06805200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05a10000 fffff880`05a24000   LHidFilt LHidFilt.Sys Tue Nov 10 06:46:17 2009 (4AF95289)
fffff880`05a31000 fffff880`05a45000   LMouFilt LMouFilt.Sys Tue Nov 10 06:46:23 2009 (4AF9528F)
fffff880`05a00000 fffff880`05a10000   LUsbFilt LUsbFilt.Sys Tue Nov 10 06:46:27 2009 (4AF95293)
fffff880`00c77000 fffff880`00cbb000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`050ba000 fffff880`050c9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05a24000 fffff880`05a31000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01669000 fffff880`01674000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`0100a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`00c00000 fffff880`00c5e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04fcc000 fffff880`04fd7000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019e2000 fffff880`019f4000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01200000 fffff880`0128a000   mv91xx   mv91xx.sys   Fri Oct 09 06:00:53 2009 (4ACF09D5)
fffff880`0128a000 fffff880`01292000   mvxxmm   mvxxmm.sys   Thu Oct 08 04:36:51 2009 (4ACDA4A3)
fffff880`0185d000 fffff880`0194f000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05298000 fffff880`052a4000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04372000 fffff880`043a1000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05af9000 fffff880`05b0e000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`041e5000 fffff880`041f4000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040bd000 fffff880`04102000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0194f000 fffff880`019af000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`052cc000 fffff880`05382000   netr28x  netr28x.sys  Fri Jun 19 03:56:06 2009 (4A3B4496)
fffff880`01674000 fffff880`01685000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041f4000 fffff880`04200000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`0305a000 fffff800`03636000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01423000 fffff880`015c6000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02e5c000 fffff880`02e65000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`043d4000 fffff880`043ea000   nusb3hub nusb3hub.sys Fri Sep 25 09:58:23 2009 (4ABCCC7F)
fffff880`04340000 fffff880`04370000   nusb3xhc nusb3xhc.sys Fri Sep 25 09:58:31 2009 (4ABCCC87)
fffff880`10d34000 fffff880`10d35180   nvBridge nvBridge.kmd Sat Apr 03 19:50:52 2010 (4BB7D45C)
fffff880`1000a000 fffff880`10d33700   nvlddmkm nvlddmkm.sys Sat Apr 03 20:06:21 2010 (4BB7D7FD)
fffff880`10de6000 fffff880`10df6000   nvoclk64 nvoclk64.sys Tue Sep 15 17:59:25 2009 (4AB00E3D)
fffff880`041a9000 fffff880`041cf000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`01017000 fffff880`0102c000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f53000 fffff880`00f86000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`011f7000 fffff880`011fe000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fe2000 fffff880`00ff2000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`016fa000 fffff880`0170b000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05b0e000 fffff880`05b4b000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cbb000 fffff880`00ccf000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`05274000 fffff880`05298000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`052a4000 fffff880`052bf000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`043a1000 fffff880`043c2000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`053e2000 fffff880`053fc000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04f7b000 fffff880`04fcc000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`052bf000 fffff880`052ca000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0164e000 fffff880`01657000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01657000 fffff880`01660000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01660000 fffff880`01669000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01761000 fffff880`0179b000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06811000 fffff880`069fb980   RTKVHD64 RTKVHD64.sys Wed Oct 14 05:31:17 2009 (4AD59A65)
fffff880`01171000 fffff880`011a0000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`019da000 fffff880`019e2000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01042000 fffff880`01168000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`052ca000 fffff880`052cb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01a00000 fffff880`01bfd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`017f3000 fffff880`01800000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`015e0000 fffff880`015fe000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`0401b000 fffff880`0402f000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`043c2000 fffff880`043d4000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05b6d000 fffff880`05b8a000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04370000 fffff880`04371f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`050a9000 fffff880`050ba000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05a9f000 fffff880`05af9000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`05053000 fffff880`050a9000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`05a45000 fffff880`05a60000   USBSTOR  USBSTOR.SYS  Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`05046000 fffff880`05053000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`0100a000 fffff880`01017000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02fcd000 fffff880`02fdb000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02fdb000 fffff880`03000000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`05bed000 fffff880`05bf8000   VMkbd    VMkbd.sys    Sat Jan 23 00:04:47 2010 (4B5A836F)
fffff880`10df6000 fffff880`10e00000   VMNET    VMNET.SYS    Mon Aug 10 08:04:50 2009 (4A800CE2)
fffff880`050c9000 fffff880`050d1000   vmnetadapter vmnetadapter.sys Mon Aug 10 08:04:53 2009 (4A800CE5)
fffff880`0184a000 fffff880`0185a000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`0102c000 fffff880`01041000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f86000 fffff880`00fe2000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01715000 fffff880`01761000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04102000 fffff880`04195000   vsdatant vsdatant.sys Mon May 03 13:44:42 2010 (4BDF0B8A)
fffff880`05382000 fffff880`0538f000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`041cf000 fffff880`041e5000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`04000000 fffff880`0401b000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`0163e000 fffff880`0164e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ea0000 fffff880`00f44000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f44000 fffff880`00f53000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`041a0000 fffff880`041a9000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`05245000 fffff880`0524e000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`01168000 fffff880`01171000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04195000 fffff880`041a0000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 20:10:33 2009 (4A5BCCF9)
fffff880`10d81000 fffff880`10de6000   yk62x64  yk62x64.sys  Mon Sep 28 04:19:31 2009 (4AC07193)

Unloaded modules:
fffff880`04304000 fffff880`0432a000   tunnel.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc000001d, fffff8000300c85f, 2, ffffff00}

Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption

Followup: memory_corruption
---------

10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8000300c85f, The address that the exception occurred at
Arg3: 0000000000000002, Parameter 0 of the exception
Arg4: 00000000ffffff00, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.

FAULTING_IP: 
hal!HalPutScatterGatherList+10f
fffff800`0300c85f d4              ???

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_PARAMETER2:  00000000ffffff00

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff880034e87e8 -- (.exr 0xfffff880034e87e8)
ExceptionAddress: fffff8000300c85f (hal!HalPutScatterGatherList+0x000000000000010f)
   ExceptionCode: c000001d (Illegal instruction)
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff880034e8890 -- (.trap 0xfffff880034e8890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800bcd8760 rbx=0000000000000000 rcx=fffffa800bcd8760
rdx=fffffa800bcd8760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000300c85f rsp=fffff880034e8a20 rbp=fffffa800b76b3a8
 r8=0000000000000001  r9=0000000000000002 r10=00000000ffffffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0x10f:
fffff800`0300c85f d4              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030fba39 to fffff800030c1740

FAILED_INSTRUCTION_ADDRESS: 
hal!HalPutScatterGatherList+10f
fffff800`0300c85f d4              ???

STACK_TEXT:  
fffff880`034e8018 fffff800`030fba39 : 00000000`0000001e ffffffff`c000001d fffff800`0300c85f 00000000`00000002 : nt!KeBugCheckEx
fffff880`034e8020 fffff800`030c0d82 : fffff880`034e87e8 00000000`00000000 fffff880`034e8890 fffffa80`093d6050 : nt!KiDispatchException+0x1b9
fffff880`034e86b0 fffff800`030beedf : fffff880`034e8890 fffffa80`093d6a02 fffffa80`093d6100 fffff880`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`034e8890 fffff800`0300c85f : fffffa80`093d61a0 00000000`00000418 00000000`00000000 fffffa80`06d22b70 : nt!KiInvalidOpcodeFault+0x11f
fffff880`034e8a20 fffff880`05187023 : fffffa80`093d61a0 fffffa80`0b76b3a8 fffffa80`093d6050 fffffa80`093d61a0 : hal!HalPutScatterGatherList+0x10f
fffff880`034e8a80 fffff880`05187ab7 : fffffa80`0b76b002 fffffa80`0b7e8010 00000000`ffffffff fffffa80`093d6ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x45f
fffff880`034e8b60 fffff880`0518564f : fffffa80`093d6ea8 fffffa80`093d61a0 fffffa80`093d7040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`034e8bc0 fffff880`05176f89 : fffffa80`093d6050 00000000`00000000 fffffa80`0925d702 fffffa80`093d6ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`034e8c00 fffff880`010d14ce : fffffa80`0925d000 fffffa80`093d6ea8 fffffa80`0925d750 fffffa80`093d6ec0 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`034e8c30 fffffa80`0925d000 : fffffa80`093d6ea8 fffffa80`0925d750 fffffa80`093d6ec0 fffff880`034c0180 : sptd+0x424ce
fffff880`034e8c38 fffffa80`093d6ea8 : fffffa80`0925d750 fffffa80`093d6ec0 fffff880`034c0180 01cb75cc`f9424b01 : 0xfffffa80`0925d000
fffff880`034e8c40 fffffa80`0925d750 : fffffa80`093d6ec0 fffff880`034c0180 01cb75cc`f9424b01 fffff880`034c5140 : 0xfffffa80`093d6ea8
fffff880`034e8c48 fffffa80`093d6ec0 : fffff880`034c0180 01cb75cc`f9424b01 fffff880`034c5140 00000000`0000002a : 0xfffffa80`0925d750
fffff880`034e8c50 fffff880`034c0180 : 01cb75cc`f9424b01 fffff880`034c5140 00000000`0000002a 00000000`00000000 : 0xfffffa80`093d6ec0
fffff880`034e8c58 01cb75cc`f9424b01 : fffff880`034c5140 00000000`0000002a 00000000`00000000 00000000`00000000 : 0xfffff880`034c0180
fffff880`034e8c60 fffff880`034c5140 : 00000000`0000002a 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1cb75cc`f9424b01
fffff880`034e8c68 00000000`0000002a : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`093d6ec0 : 0xfffff880`034c5140
fffff880`034e8c70 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`093d6ec0 fffffa80`093d6ea8 : 0x2a


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
    fffff8000300c802-fffff8000300c909  264 bytes - hal!HalPutScatterGatherList+b2
    [ 85 ff 74 0f 8b 6f 2c 8b:ff 01 f6 40 a0 69 00 40 ]
264 errors : !hal (fffff8000300c802-fffff8000300c909)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE

BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE

Followup: memory_corruption
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800b381e68, fffff8800b3816d0, fffff8000301ccfe}

Probably caused by : Ntfs.sys ( Ntfs! ?? ::FNODOBFM::`string'+2cc9 )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800b381e68
Arg3: fffff8800b3816d0
Arg4: fffff8000301ccfe

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800b381e68 -- (.exr 0xfffff8800b381e68)
ExceptionAddress: fffff8000301ccfe (nt! ?? ::FNODOBFM::`string'+0x000000000002dc3f)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000030
Attempt to read from address 0000000000000030

CONTEXT:  fffff8800b3816d0 -- (.cxr 0xfffff8800b3816d0)
rax=0000000000000000 rbx=0000000000000000 rcx=00000000ffffffff
rdx=fffffa800bd03ba0 rsi=0000000000000000 rdi=fffffa800506d570
rip=fffff8000301ccfe rsp=fffff8800b3820a0 rbp=fffff8800b382100
 r8=fffff80003007000  r9=fffff8800b381e30 r10=0000000fffffffff
r11=fffff8800b382030 r12=0000000000000002 r13=0000000048440000
r14=0000000000000000 r15=00000000001acf1d
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt! ?? ::FNODOBFM::`string'+0x2dc3f:
fffff800`0301ccfe 8b4830          mov     ecx,dword ptr [rax+30h] ds:002b:00000000`00000030=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000030

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af0e0
 0000000000000030 

FOLLOWUP_IP: 
Ntfs! ?? ::FNODOBFM::`string'+2cc9
fffff880`014303d8 cc              int     3

FAULTING_IP: 
nt! ?? ::FNODOBFM::`string'+2dc3f
fffff800`0301ccfe 8b4830          mov     ecx,dword ptr [rax+30h]

BUGCHECK_STR:  0x24

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8000301ccfe

STACK_TEXT:  
fffff880`0b380e98 fffff880`014303d8 : 00000000`00000024 00000000`001904fb fffff880`0b381e68 fffff880`0b3816d0 : nt!KeBugCheckEx
fffff880`0b380ea0 fffff880`0148d3cf : fffff880`01460b0c fffff880`0b3823e0 fffff880`0b3823e0 00000000`00001820 : Ntfs! ?? ::FNODOBFM::`string'+0x2cc9
fffff880`0b380ee0 fffff800`030a5d1c : 00000000`ffff0053 00000000`00001850 00000000`ffff0053 00000000`00001860 : Ntfs! ?? ::NNGAKEGL::`string'+0x81c8
fffff880`0b380f20 fffff800`0309d40d : fffff880`01460b00 fffff880`0b3823e0 00000000`00000000 fffff880`0140f000 : nt!_C_specific_handler+0x8c
fffff880`0b380f90 fffff800`030a4a90 : fffff880`01460b00 fffff880`0b381008 fffff880`0b381e68 fffff880`0140f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0b380fc0 fffff800`030b19ef : fffff880`0b381e68 fffff880`0b3816d0 fffff880`00000000 fffffa80`0506d570 : nt!RtlDispatchException+0x410
fffff880`0b3816a0 fffff800`03076d82 : fffff880`0b381e68 00000000`00000000 fffff880`0b381f10 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`0b381d30 fffff800`030758fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0b381f10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a


STACK_COMMAND:  kb

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs! ?? ::FNODOBFM::`string'+2cc9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!_??_::FNODOBFM::_string_+2cc9

BUCKET_ID:  X64_0x24_Ntfs!_??_::FNODOBFM::_string_+2cc9

Followup: MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 58, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000058
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  mscorsvw.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800c4ce620 -- (.trap 0xfffff8800c4ce620)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800c4ce828 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8800c4ce7e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003196a70 rsp=fffff8800c4ce7b0 rbp=0000000000000080
 r8=0000000000000003  r9=fffffa8007772b30 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x40:
fffff800`03196a70 4c8b6e58        mov     r13,qword ptr [rsi+58h] ds:e838:00000000`00000058=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003084b7a to fffff800030d8740

STACK_TEXT:  
fffff880`0c4ce4b8 fffff800`03084b7a : 00000000`0000001a 00000000`00041287 00000000`00000058 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c4ce4c0 fffff800`030d682e : 00000000`00000000 00000000`052c9008 00000000`00001000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`0c4ce620 fffff800`03196a70 : 00000000`00000001 00000000`00000000 00000000`0120ff00 fffffa80`099a5b10 : nt!KiPageFault+0x16e
fffff880`0c4ce7b0 fffff800`0314be38 : 00000080`000000e6 fffffa80`00000122 00000000`052c9008 00000000`052e2000 : nt!MiReleaseConfirmedPageFileSpace+0x40
fffff880`0c4ce830 fffff800`0310bdf9 : 00000000`00000000 00000000`052f3fff fffffa80`00000000 fffffa80`07770000 : nt! ?? ::FNODOBFM::`string'+0x33798
fffff880`0c4ce9f0 fffff800`033f11d0 : fffffa80`06dba0e0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0c4ceb10 fffff800`033f15db : 00000980`00000000 00000000`052b0000 fffffa80`00000001 fffffa80`075e1290 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0c4cebd0 fffff800`030d7993 : 00000000`00000008 00000000`00000000 fffffa80`07772b30 fffffa80`0b9af690 : nt!NtUnmapViewOfSection+0x5f
fffff880`0c4cec20 00000000`7747fffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001ddee8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7747fffa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`03084b7a cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+42ba5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

BUCKET_ID:  X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5

Followup: MachineOwner
---------
My System SpecsSystem Spec
27 Oct 2010   #3

Win 7 Professional 64-bit
 
 

Thanks for the help.
I'll uninstall Daemon Tools.
ZA - is there any other good security suite that doesnt cause problems?
I really dont want to rely on just windows firewall...

Also - for almost 7 months everything was OK. ZA/Daemon tools didnt cause any problems. It all started several days ago when I installed new CPU cooling system... maybe i damaged motherboard somehow?

Malware: malwarebytes reported no problems. I also do regularly scan with malware and ZA and never had any problems with viruses
My System SpecsSystem Spec
.


27 Oct 2010   #4

Windows 7 Ultimate 32 bit
 
 

Good job with Malwarebytes. It makes for a really good on demand Malware scanner. Just remember to update it before each scan. Do uninstall Daemon or sptd will continue to bite you.

Windows Firewall is a better firewall than is ZA. Its only shortcoming is the complicated rules creating procedure to block outgoing connections. How ever, there is an addon which makes this task easy and simplifies configuring: Windows Firewall Control - Spinx software. I have nothing against ZA; I still use it on my XP computer. But its firewall as not as good as it should be. Until you get your system stable, I would not recommend any third party firewall. Nearly every third party antivirus, firewall, and security suite program out there has created problems on some Win 7 systems. There are logical and valid reason for this. Win 7 has increased security measures in the coding and third party security software cause conflicts. Avast was designed to work with Win 7 and does so smoothly.
My System SpecsSystem Spec
Reply

 BSOD's started recently




Thread Tools




Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 11:40 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33