Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.



Windows 7: Seemingly Random BSOD

04 Nov 2010   #1

Win7 Pro 64bit
 
 
Seemingly Random BSOD

Hi guys

I have put together a system for a friend that has been having random BSOD events since it was setup 4 weeks ago.

During initial install of Windows 7 it came up with some error saying that a file was missing, restarted the install and installed fine.

Running Windows 7 64bit.

Any help would be great thanks

My System SpecsSystem Spec
.

04 Nov 2010   #2

Windows 7 x64
 
 

Hold on, let me take a look...


Edit:

1. Remove Symantec completely:

Download and run the Norton Removal Tool to uninstall your Norton product | Norton Support


Install MSE:


http://www.microsoft.com/security_essentials/




2.Update the ATI driver:

atikmdag.sys Wed Nov 11 00:25:32 2009




3. Run bootable diagnostics:

HD Diagnostic

RAM - Test with Memtest86+




Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110410-17643-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Thu Nov  4 04:23:07.556 2010 (UTC - 4:00)
System Uptime: 0 days 0:21:51.992
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1097, 0, fffff880066e2d80}

GetPointerFromAddress: unable to read from fffff80002cc10e0
GetUlongFromAddress: unable to read from fffff80002c2f1b0
GetUlongFromAddress: unable to read from fffff80002c2f1b0
Probably caused by : Ntfs.sys ( Ntfs! ?? ::FNODOBFM::`string'+5cde )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff880066e2d80, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80002c2f1b0
GetUlongFromAddress: unable to read from fffff80002c2f1b0

POOL_ADDRESS:  fffff880066e2d80 

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002bbc60e to fffff80002a8af00

STACK_TEXT:  
fffff880`066e2bc8 fffff800`02bbc60e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
fffff880`066e2bd0 fffff880`0123c247 : fffff880`066e2cd0 00000000`00000000 fffff8a0`0197db00 fffffa80`00000000 : nt!ExFreePool+0xccb
fffff880`066e2c80 fffff880`0122aa12 : fffff880`066e3040 fffffa80`0793ec10 fffffa80`04c9f180 fffff8a0`0197db10 : Ntfs! ?? ::FNODOBFM::`string'+0x5cde
fffff880`066e2e50 fffff880`0122f413 : fffff880`066e3040 fffffa80`0793ec10 fffff880`066e3200 fffff880`066e3901 : Ntfs!NtfsCommonWrite+0x872
fffff880`066e3010 fffff880`00c3823f : fffffa80`0793efb0 fffffa80`0793ec10 fffffa80`0746dbb0 00000000`00000000 : Ntfs!NtfsFsdWrite+0x1c3
fffff880`066e3290 fffff880`00c366df : fffffa80`061a03b0 fffffa80`05351910 fffffa80`061a0300 fffffa80`0793ec10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`066e3320 fffff800`02a79b4f : fffffa80`0793ec10 fffff880`066e3838 fffff880`066e3530 fffff880`009e9180 : fltmgr!FltpDispatch+0xcf
fffff880`066e3380 fffff800`02a791c7 : 00000000`00000000 fffff880`066e3838 fffffa80`0175b5a0 00000000`00000000 : nt!IoSynchronousPageWrite+0x24f
fffff880`066e3400 fffff800`02a77194 : fffff8a0`01a05200 fffff8a0`01a05210 fffffa80`07067190 fffffa80`07067190 : nt!MiFlushSectionInternal+0xa58
fffff880`066e3640 fffff800`02a76a99 : fffffa80`0705ccd8 00000000`00000000 00000000`00002000 00000000`00000000 : nt!MmFlushSection+0x1f4
fffff880`066e3700 fffff880`012e3642 : fffffa80`0705ccd8 fffff880`00000000 fffffa80`00000000 00000000`00002000 : nt!CcFlushCache+0x5e9
fffff880`066e3800 fffff880`012e46ba : fffff8a0`0197db10 fffff8a0`0197db10 fffff8a0`0197db10 fffffa80`0461c900 : Ntfs!NtfsFlushUserStream+0x92
fffff880`066e3880 fffff880`012e388e : fffffa80`0461c900 fffff8a0`0197db10 fffff880`066e3a40 fffff880`00c3927e : Ntfs!NtfsPerformOptimisticFlush+0x7a
fffff880`066e38e0 fffff880`012e45f0 : fffffa80`0461c900 fffffa80`0479a010 fffffa80`05351910 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x12a
fffff880`066e39c0 fffff880`00c3823f : fffffa80`0479a3b0 fffffa80`0479a010 fffffa80`0461c900 fffff880`066e39e8 : Ntfs!NtfsFsdFlushBuffers+0x104
fffff880`066e3a30 fffff880`00c366df : fffffa80`061a03b0 00000000`00000001 fffffa80`061a0300 fffffa80`0479a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`066e3ac0 fffff800`02d9e929 : 00000000`00000002 fffffa80`05351910 00000000`00000001 fffffa80`0479a010 : fltmgr!FltpDispatch+0xcf
fffff880`066e3b20 fffff800`02d2c8ad : fffffa80`0479a010 fffffa80`070f7b60 fffffa80`05351910 fffff880`009e9180 : nt!IopSynchronousServiceTail+0xf9
fffff880`066e3b90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFlushBuffersFile+0x171


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs! ?? ::FNODOBFM::`string'+5cde
fffff880`0123c247 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  Ntfs! ?? ::FNODOBFM::`string'+5cde

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

FAILURE_BUCKET_ID:  X64_0xc2_7_Ntfs!_??_::FNODOBFM::_string_+5cde

BUCKET_ID:  X64_0xc2_7_Ntfs!_??_::FNODOBFM::_string_+5cde

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110210-29078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Tue Nov  2 05:28:39.302 2010 (UTC - 4:00)
System Uptime: 0 days 0:13:25.738
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff70001080000, df, e1000001b6}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+297b1 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000000df
Arg4: 000000e1000001b6

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  iexplore.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002ae226c to fffff80002a72f00

STACK_TEXT:  
fffff880`08646878 fffff800`02ae226c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000000df : nt!KeBugCheckEx
fffff880`08646880 fffff800`02a99353 : 0de00001`07f14025 00000001`07e14121 fffff8a0`00000000 fffffa80`03e1c428 : nt! ?? ::FNODOBFM::`string'+0x297b1
fffff880`08646910 fffff800`02a8ed9e : 00000000`00000000 00000000`7713d000 fffff680`003b89e8 fffffa80`03e1c428 : nt!MiResolveProtoPteFault+0x1d3
fffff880`086469b0 fffff800`02a8cf23 : 00000000`00000000 00000000`7713d000 fffff880`08646ca0 fffff800`00000000 : nt!MiDispatchFault+0x1de
fffff880`08646ac0 fffff800`02a70fee : 00000000`00000000 00000000`77584138 00000000`7efdb001 00000000`00000000 : nt!MmAccessFault+0x343
fffff880`08646c20 00000000`7759ff88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0037f418 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7759ff88


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+297b1
fffff800`02ae226c cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+297b1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+297b1

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+297b1

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110410-19047-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a60000 PsLoadedModuleList = 0xfffff800`02c9de50
Debug session time: Thu Nov  4 05:18:29.587 2010 (UTC - 4:00)
System Uptime: 0 days 0:38:52.023
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000096, fffff88001034621, fffff88003782a18, fffff88003782270}

Probably caused by : hardware ( volsnap!VspCopyDataWorker+1a1 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff88001034621, The address that the exception occurred at
Arg3: fffff88003782a18, Exception Record Address
Arg4: fffff88003782270, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {

FAULTING_IP: 
volsnap!VspCopyDataWorker+1a1
fffff880`01034621 6c              ins     byte ptr [rdi],dx

EXCEPTION_RECORD:  fffff88003782a18 -- (.exr 0xfffff88003782a18)
ExceptionAddress: fffff88001034621 (volsnap!VspCopyDataWorker+0x00000000000001a1)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  fffff88003782270 -- (.cxr 0xfffff88003782270)
rax=0000000000000000 rbx=0000000000004000 rcx=fffffa8004aaa1a8
rdx=0000000000000000 rsi=fffffa8004aaa190 rdi=0000000361ab8000
rip=fffff88001034621 rsp=fffff88003782c50 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000004
r11=0000000000000000 r12=fffffa8003df71b0 r13=fffffa8003e00c10
r14=0000000000000000 r15=0000000326448000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
volsnap!VspCopyDataWorker+0x1a1:
fffff880`01034621 6c              ins     byte ptr [rdi],dx ds:002b:00000003`61ab8000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000096 - {

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  STATUS_PRIVILEGED_INSTRUCTION

MISALIGNED_IP: 
volsnap!VspCopyDataWorker+1a1
fffff880`01034621 6c              ins     byte ptr [rdi],dx

LAST_CONTROL_TRANSFER:  from fffff8800101493d to fffff88001034621

STACK_TEXT:  
fffff880`03782c50 fffff880`0101493d : fffffa80`04a98400 00000003`61acf000 fffffa80`03df71b0 fffffa80`077c8810 : volsnap!VspCopyDataWorker+0x1a1
fffff880`03782d00 fffff800`02d75166 : fffffa80`04b70b60 00000000`00000080 fffffa80`03b6f040 fffffa80`04b70b60 : volsnap!VspWorkerThread+0xad
fffff880`03782d40 fffff800`02ab0486 : fffff800`02c4ae80 fffffa80`04b70b60 fffff800`02c58c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03782d80 00000000`00000000 : fffff880`03783000 fffff880`0377d000 fffff880`037826a0 00000000`00000000 : nt!KxStartSystemThread+0x16


FOLLOWUP_IP: 
volsnap!VspCopyDataWorker+1a1
fffff880`01034621 6c              ins     byte ptr [rdi],dx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  volsnap!VspCopyDataWorker+1a1

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff88003782270 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED_volsnap.sys

BUCKET_ID:  X64_IP_MISALIGNED_volsnap.sys

Followup: MachineOwner
---------


























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\110410-21200-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Thu Nov  4 06:09:21.702 2010 (UTC - 4:00)
System Uptime: 0 days 0:05:13.138
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88002fb65d8, fffff88002fb5e30, fffff80002aa651a}

Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteScb+108 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88002fb65d8
Arg3: fffff88002fb5e30
Arg4: fffff80002aa651a

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88002fb65d8 -- (.exr 0xfffff88002fb65d8)
ExceptionAddress: fffff80002aa651a (nt!RtlDeleteNoSplay+0x0000000000000096)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000

CONTEXT:  fffff88002fb5e30 -- (.cxr 0xfffff88002fb5e30)
rax=fffff8a009229280 rbx=0000000000000000 rcx=fffff8a00a9cf1f8
rdx=0000000000000000 rsi=ffffffffffffffff rdi=fffffa80060ae6e8
rip=fffff80002aa651a rsp=fffff88002fb6810 rbp=fffffa8007b42510
 r8=fffffa80060ae6e8  r9=ffffffffffffffff r10=fffff880009eaa20
r11=fffff8a009229280 r12=0000000000000703 r13=0000000000000000
r14=fffffa8007b424c8 r15=fffff8a009a8fed0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!RtlDeleteNoSplay+0x96:
fffff800`02aa651a 48890b          mov     qword ptr [rbx],rcx ds:002b:00000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000000

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf90e0
 0000000000000000 

FOLLOWUP_IP: 
Ntfs!NtfsDeleteScb+108
fffff880`012c7bcc 488b03          mov     rax,qword ptr [rbx]

FAULTING_IP: 
nt!RtlDeleteNoSplay+96
fffff800`02aa651a 48890b          mov     qword ptr [rbx],rcx

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff8800103a373 to fffff80002aa651a

STACK_TEXT:  
fffff880`02fb6810 fffff880`0103a373 : fffff8a0`0a841500 fffff800`02bf62dd fffffa80`06038270 ffffffff`ffffffff : nt!RtlDeleteNoSplay+0x96
fffff880`02fb6840 fffff880`01036238 : fffff8a0`09d18600 fffff800`02bf62dd fffffa80`6e664d46 fffff880`0103f66e : fltmgr!TreeUnlinkNoBalance+0x13
fffff880`02fb6870 fffff880`0105435c : 00000000`00000000 fffff880`02fb69e1 fffffa80`052f2180 fffffa80`048ddd50 : fltmgr!TreeUnlinkMulti+0x148
fffff880`02fb68c0 fffff880`01056bc1 : fffffa80`04b84800 00000000`00000130 fffff8a0`09a8fbc0 fffff8a0`09a8fbc0 : fltmgr!FltpDeleteContextList+0x3c
fffff880`02fb68f0 fffff880`01056b7b : fffffa80`04b84800 fffff8a0`09a8fed0 fffffa80`04b84800 fffff8a0`07704b00 : fltmgr!CleanupStreamListCtrl+0x21
fffff880`02fb6920 fffff800`02daf46e : 00000000`00000001 fffff880`012c81a7 fffff8a0`09a8fed0 00000000`00000000 : fltmgr!DeleteStreamListCtrlCallback+0x6b
fffff880`02fb6950 fffff880`012c7bcc : fffff8a0`09a8fbc0 fffffa80`03bceb60 fffff880`02fb6a28 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0xe2
fffff880`02fb69a0 fffff880`012c78d5 : 00000000`00000000 00000000`00000000 fffff800`02c66500 00000000`00000001 : Ntfs!NtfsDeleteScb+0x108
fffff880`02fb69e0 fffff880`0123acb4 : fffff8a0`09a8fac0 fffff8a0`09a8fbc0 fffff800`02c66500 fffff880`02fb6b52 : Ntfs!NtfsRemoveScb+0x61
fffff880`02fb6a20 fffff880`012c52dc : fffff8a0`09a8fa90 fffff800`02c665a0 fffff880`02fb6b52 fffffa80`042aaa40 : Ntfs!NtfsPrepareFcbForRemoval+0x50
fffff880`02fb6a50 fffff880`01243882 : fffffa80`042aaa40 fffffa80`042aaa40 fffff8a0`09a8fa90 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xdc
fffff880`02fb6ad0 fffff880`012dc813 : fffffa80`042aaa40 fffff800`02c665a0 fffff8a0`09a8fa90 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`02fb6b10 fffff880`012b638f : fffffa80`042aaa40 fffff8a0`09a8fbc0 fffff8a0`09a8fa90 fffffa80`052f2180 : Ntfs!NtfsCommonClose+0x353
fffff880`02fb6be0 fffff800`02ad0161 : 00000000`00000000 fffff880`012b6200 fffff800`02cc8101 00000442`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`02fb6cb0 fffff800`02d66166 : 00000442`00000000 fffffa80`03bceb60 00000000`00000080 fffffa80`03bba040 : nt!ExpWorkerThread+0x111
fffff880`02fb6d40 fffff800`02aa1486 : fffff880`009e9180 fffffa80`03bceb60 fffff880`009f3f40 00000442`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fb6d80 00000000`00000000 : fffff880`02fb7000 fffff880`02fb1000 fffff880`02fb69f0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  Ntfs!NtfsDeleteScb+108

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88002fb5e30 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsDeleteScb+108

BUCKET_ID:  X64_0x24_Ntfs!NtfsDeleteScb+108

Followup: MachineOwner
---------

1: kd> lmtn
start             end                 module name
fffff880`00ee4000 fffff880`00f3b000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cec000 fffff880`02d76000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04fda000 fffff880`04ff0000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03f33000 fffff880`03f48000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ec0000 fffff880`00ecb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0489f000 fffff880`048a7000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`00e8d000 fffff880`00e96000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e96000 fffff880`00ec0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`042da000 fffff880`042fb000   AtiHdmi  AtiHdmi.sys  Wed Sep 30 09:54:46 2009 (4AC36326)
fffff880`048b1000 fffff880`04ed6000   atikmdag atikmdag.sys Wed Nov 11 00:25:32 2009 (4AFA4ACC)
fffff880`01869000 fffff880`01870000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03e20000 fffff880`03f0d000   BHDrvx64 BHDrvx64.sys Fri Aug 27 18:11:09 2010 (4C7837FD)
fffff880`03d98000 fffff880`03da9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05da8000 fffff880`05dc6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`03cfc000 fffff880`03d98000   ccHPx64  ccHPx64.sys  Fri Aug 21 19:01:40 2009 (4A8F2754)
fffff960`00780000 fffff960`007a7000   cdd      cdd.dll      unavailable (00000000)
fffff880`01836000 fffff880`01860000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d33000 fffff880`00df3000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`019c7000 fffff880`019f7000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cd5000 fffff880`00d33000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0142d000 fffff880`014a0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04fca000 fffff880`04fda000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05a1a000 fffff880`05a28000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03a0f000 fffff880`03a92000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03cde000 fffff880`03cfc000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03a00000 fffff880`03a0f000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019b1000 fffff880`019c7000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04338000 fffff880`0435a000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05a34000 fffff880`05a3d000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05a28000 fffff880`05a34000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043b4000 fffff880`043c7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05a00000 fffff880`05a0c000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04ed6000 fffff880`04fca000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`04800000 fffff880`04846000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03b89000 fffff880`03bff000   eeCtrl64 eeCtrl64.sys Fri May 21 17:44:45 2010 (4BF6FECD)
fffff880`06bdb000 fffff880`06bfb000   ENG64    ENG64.SYS    Wed Sep 15 06:25:35 2010 (4C909F1F)
fffff880`06a1d000 fffff880`06bdb000   EX64     EX64.SYS     Wed Sep 15 06:33:41 2010 (4C90A105)
fffff880`010eb000 fffff880`010ff000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01031000 fffff880`0107d000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`014b1000 fffff880`014bb000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01977000 fffff880`019b1000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01874000 fffff880`018be000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0486a000 fffff880`04877000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02a08000 fffff800`02a51000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04846000 fffff880`0486a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`04219000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05a3f000 fffff880`05a47080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`043e4000 fffff880`043f2000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05ce0000 fffff880`05da8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0196e000 fffff880`01977000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03b0e000 fffff880`03b89000   IDSvia64 IDSvia64.sys Fri Sep 10 17:54:50 2010 (4C8AA92A)
fffff880`00fb8000 fffff880`00fdf000   Ironx64  Ironx64.SYS  Wed Nov 25 18:04:17 2009 (4B0DB7F1)
fffff880`03c3b000 fffff880`03c4a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04219000 fffff880`04227000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc8000 fffff800`00bd2000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03c59000 fffff880`03c9c000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013d5000 fffff880`013ef000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015ad000 fffff880`015d8000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`0435a000 fffff880`0435f200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03cae000 fffff880`03cc3000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04227000 fffff880`0424a000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cb4000 fffff880`00cc1000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`05a0c000 fffff880`05a1a000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03c4a000 fffff880`03c59000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0424a000 fffff880`04257000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e73000 fffff880`00e8d000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05dc6000 fffff880`05dde000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05c00000 fffff880`05c2c000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`05c2c000 fffff880`05c79000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`05c79000 fffff880`05c9c000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`01200000 fffff880`0120b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f44000 fffff880`00f4e000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0113a000 fffff880`01198000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03b03000 fffff880`03b0e000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0195c000 fffff880`0196e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014bb000 fffff880`015ad000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04ff0000 fffff880`04ffc000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03dcd000 fffff880`03dfc000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`042c5000 fffff880`042da000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02dea000 fffff880`02df9000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d76000 fffff880`02dbb000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01198000 fffff880`011f8000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`0120b000 fffff880`0121c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03af7000 fffff880`03b03000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a51000 fffff800`0302e000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01232000 fffff880`013d5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01860000 fffff880`01869000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02dc4000 fffff880`02dea000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f8e000 fffff880`00fa3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f4e000 fffff880`00f81000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014a0000 fffff880`014b1000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0601f000 fffff880`060c5000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`042fb000 fffff880`04338000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cc1000 fffff880`00cd5000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03da9000 fffff880`03dcd000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03e00000 fffff880`03e1b000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03c00000 fffff880`03c21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03c21000 fffff880`03c3b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03aa6000 fffff880`03af7000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03ff0000 fffff880`03ffb000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019f7000 fffff880`01a00000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`015f6000 fffff880`015ff000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013ef000 fffff880`013f8000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01922000 fffff880`0195c000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03cc3000 fffff880`03cdb000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f9e000 fffff880`03ff0000   Rt64win7 Rt64win7.sys Mon Feb 08 22:42:09 2010 (4B70D991)
fffff880`060c5000 fffff880`060d0000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`04893000 fffff880`0489f000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02c00000 fffff880`02c1d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0191a000 fffff880`01922000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06589000 fffff880`065fa000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`06503000 fffff880`06589000   SRTSP64  SRTSP64.SYS  Wed Dec 02 00:55:48 2009 (4B160164)
fffff880`00fdf000 fffff880`00ff3000   SRTSPX64 SRTSPX64.SYS Wed Dec 02 00:58:24 2009 (4B160200)
fffff880`0646b000 fffff880`06503000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`0610f000 fffff880`06178000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`060d0000 fffff880`060fd000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`04ffc000 fffff880`04ffd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`0107d000 fffff880`010eb000   SYMDS64  SYMDS64.SYS  Mon Aug 17 19:35:30 2009 (4A89E942)
fffff880`010ff000 fffff880`0113a000   SYMEFA64 SYMEFA64.SYS Mon Nov 23 20:35:40 2009 (4B0B386C)
fffff880`02cb6000 fffff880`02cec000   SYMEVENT64x86 SYMEVENT64x86.SYS Thu Aug 13 18:28:21 2009 (4A849385)
fffff880`02c40000 fffff880`02cb6000   SYMTDIV  SYMTDIV.SYS  Thu Nov 19 21:21:24 2009 (4B05FD24)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`060fd000 fffff880`0610f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0121c000 fffff880`01229000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01000000 fffff880`0101e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`00ecb000 fffff880`00edf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03f0d000 fffff880`03f33000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04360000 fffff880`043b4000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`03c9c000 fffff880`03cae000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`043c7000 fffff880`043e4000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05a3d000 fffff880`05a3ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04882000 fffff880`04893000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0426b000 fffff880`042c5000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04877000 fffff880`04882000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03f48000 fffff880`03f9e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f81000 fffff880`00f8e000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`015d8000 fffff880`015e6000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05a4b000 fffff880`05bfc000   viahduaa viahduaa.sys Tue Mar 02 06:30:18 2010 (4B8CF6CA)
fffff880`01400000 fffff880`01425000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`018be000 fffff880`018ce000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fa3000 fffff880`00fb8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`018ce000 fffff880`0191a000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02c1d000 fffff880`02c38000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015e6000 fffff880`015f6000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02dbb000 fffff880`02dc4000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000d0000 fffff960`003df000   win32k   win32k.sys   unavailable (00000000)
fffff880`048a7000 fffff880`048b0000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f3b000 fffff880`00f44000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`01800000 fffff880`0180e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0180e000 fffff880`0181a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0181a000 fffff880`01823000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01823000 fffff880`01836000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
Reply

 Seemingly Random BSOD





Thread Tools



Similar help and support threads for2: Seemingly Random BSOD
Thread Forum
Seemingly Random BSOD's, 2 or 3 in a day BSOD Help and Support
BSOD - seemingly random BSOD Help and Support
BSOD Seemingly random, almost every day BSOD Help and Support
BSOD (seemingly random) BSOD Help and Support
Seemingly random BSOD BSOD Help and Support
BSOD, seemingly random BSOD Help and Support
Seemingly Random BSOD BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 05:42 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33