win32k.sys BSOD


  1. Posts : 8
    windows 7 ultimate 32bit
       #1

    win32k.sys BSOD


    Hello everybody,


    I am getting random blue screens all the time for different errors including win32k.sys and memory management. BSODs also randomly occur on bootup as well. I have a Dell Studio Laptop 1535 with 4 gigs of ram:
    • Radeon HD 4300 Series graphics card
    • Dual Intel 5750 2.0 GHz processor
    • Windows 7 Ultimate 32bit
    • This is not the original OS installed (Windows Vista 32bit was the original OS)
    • The age of my system is a little over 2 years old
    • The current OS installation is a few weeks old
    Thanks for your help.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Uninstall Kaspersky with this tool:

    Removal tool for Kaspersky Lab products


    Uninstall SUPERAntiSpyware.


    Install MSE as the replacement:

    https://www.microsoft.com/security_essentials/




    Update drivers:

    RICOH XD SM R5C852
    rixdptsk.sys Tue Nov 14 20:35:19 2006

    Broadcom NetLink (TM) Gigabit Ethernet NDIS6.x
    k57nd60x.sys Sun Apr 26 07:23:19 2009

    PerfectDisk Raxco Software
    DefragFS.SYS Wed Aug 19 13:31:36 2009

    Broadcom 802.11 Network Adapter wireless
    bcmwl6.sys Tue Jul 07 20:44:47 2009






    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\122310-25802-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a39000 PsLoadedModuleList = 0x82b81810
    Debug session time: Thu Dec 23 00:49:26.915 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:13.881
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    .....
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 001904fb
    Arg2: 9d992af8
    Arg3: 9d9926d0
    Arg4: 8c228773
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  9d992af8 -- (.exr 0xffffffff9d992af8)
    ExceptionAddress: 8c228773 (Ntfs!NtfsFindRollbackStructByType+0x00000023)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 0003fff8
    Attempt to read from address 0003fff8
    
    CONTEXT:  9d9926d0 -- (.cxr 0xffffffff9d9926d0)
    eax=00000000 ebx=8873bd5c ecx=00040000 edx=0003fff8 esi=8873bd5c edi=00000000
    eip=8c228773 esp=9d992bc0 ebp=9d992bc8 iopl=0         nv up ei pl nz ac po cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010213
    Ntfs!NtfsFindRollbackStructByType+0x23:
    8c228773 0fb73a          movzx   edi,word ptr [edx]       ds:0023:0003fff8=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  0003fff8
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82ba1718
    Unable to read MiSystemVaType memory at 82b81160
     0003fff8 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsFindRollbackStructByType+23
    8c228773 0fb73a          movzx   edi,word ptr [edx]
    
    FAULTING_IP: 
    Ntfs!NtfsFindRollbackStructByType+23
    8c228773 0fb73a          movzx   edi,word ptr [edx]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from 8c227d53 to 8c228773
    
    STACK_TEXT:  
    9d992bc8 8c227d53 8873bd5c 00000727 00000000 Ntfs!NtfsFindRollbackStructByType+0x23
    9d992bec 8c2286d9 8873bcf0 a458a820 a458a820 Ntfs!NtfsFreeSnapshotsForFcb+0x25
    9d992c04 8c22ec22 8873bcf0 a458a820 9d992cd0 Ntfs!NtfsReleaseFcb+0x35
    9d992c1c 8c2ae5d7 8873bcf0 a458a820 8c2ae57c Ntfs!NtfsReleaseFcbWithPaging+0x2a
    9d992c28 8c2ae57c 11bc871e 9d992ca4 8873bcf0 Ntfs!NtfsCommonClose+0x569
    9d992c6c 8c2cd4c3 8873bcf0 a458a910 a458a820 Ntfs!NtfsCommonClose+0x513
    9d992d00 82aa6f3b 00000000 00000000 886fd380 Ntfs!NtfsFspClose+0x118
    9d992d50 82c476d3 80000000 b0ff03dc 00000000 nt!ExpWorkerThread+0x10d
    9d992d90 82af90f9 82aa6e2e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsFindRollbackStructByType+23
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff9d9926d0 ; kb
    
    FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsFindRollbackStructByType+23
    
    BUCKET_ID:  0x24_Ntfs!NtfsFindRollbackStructByType+23
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\122310-25459-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b7f810
    Debug session time: Thu Dec 23 00:45:41.117 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:26.099
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    .....
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 00001236, The subtype of the bugcheck.
    Arg2: 8877ea60
    Arg3: 8877ead4
    Arg4: 00156792
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_1236
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82ab7ff4 to 82b13d10
    
    STACK_TEXT:  
    977b9a9c 82ab7ff4 0000001a 00001236 8877ea60 nt!KeBugCheckEx+0x1e
    977b9ad4 8c609c55 000002ad 00000f94 85382268 nt!MmFreePagesFromMdl+0x39
    977b9ae8 8c60ae42 85382220 00000f94 8610cf28 rdyboost!SMKM_STORE<SMD_TRAITS>::SmStReleaseRegion+0x1f
    977b9b00 8c60ea24 85382268 00000f94 8c6240b0 rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+0x24
    977b9b20 8c60eae8 85382268 00000000 85382220 rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0xb4
    977b9b34 8c60ebe9 85382220 85382220 85382220 rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x14
    977b9b48 8c60ec92 85382220 00000001 8c6240f8 rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0x57
    977b9b64 8c62bc45 8c6240b0 85382220 00000001 rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x2a
    977b9b84 8c60b9cd 00000008 8c6240b0 977b9bb4 rdyboost!SmKmCleanup+0x79
    977b9b94 8c626ab3 8c6240b0 00000000 87d2c0d0 rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0xf
    977b9bb4 8c6178f5 8c6240b0 00000000 1b19ab01 rdyboost!SmdRBContextShutdown+0x83
    977b9bfc 82a734bc 85382120 87d2c0d0 87d2c0d0 rdyboost!SmdDispatchDeviceControl+0x273
    977b9c14 82c74f6e 889c5918 87d2c0d0 87d2c140 nt!IofCallDriver+0x63
    977b9c34 82c91d5f 85382120 889c5918 00000000 nt!IopSynchronousServiceTail+0x1f8
    977b9cd0 82c9453a 85382120 87d2c0d0 00000000 nt!IopXxxControlFile+0x6aa
    977b9d04 82a7a44a 000005cc 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
    977b9d04 776964f4 000005cc 00000000 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0162ee40 00000000 00000000 00000000 00000000 0x776964f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    rdyboost!SMKM_STORE<SMD_TRAITS>::SmStReleaseRegion+1f
    8c609c55 6a00            push    0
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  rdyboost!SMKM_STORE<SMD_TRAITS>::SmStReleaseRegion+1f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: rdyboost
    
    IMAGE_NAME:  rdyboost.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc19a
    
    FAILURE_BUCKET_ID:  0x1a_1236_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStReleaseRegion+1f
    
    BUCKET_ID:  0x1a_1236_rdyboost!SMKM_STORE_SMD_TRAITS_::SmStReleaseRegion+1f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\122210-40061-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a46000 PsLoadedModuleList = 0x82b8e810
    Debug session time: Thu Dec 16 00:13:29.229 2010 (UTC - 5:00)
    System Uptime: 0 days 1:14:43.211
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 82c5eaf7, 99d36b30, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!CmpRemoveKeyHash+17 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82c5eaf7, The address that the exception occurred at
    Arg3: 99d36b30, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!CmpRemoveKeyHash+17
    82c5eaf7 f7b12c030000    div     eax,dword ptr [ecx+32Ch]
    
    TRAP_FRAME:  99d36b30 -- (.trap 0xffffffff99d36b30)
    ErrCode = 00000000
    eax=0b8caca4 ebx=982339d0 ecx=00000000 edx=00000000 esi=a0d6b5b4 edi=a0d6b5a8
    eip=82c5eaf7 esp=99d36ba4 ebp=99d36bbc iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!CmpRemoveKeyHash+0x17:
    82c5eaf7 f7b12c030000    div     eax,dword ptr [ecx+32Ch] ds:0023:0000032c=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82c5eab3 to 82c5eaf7
    
    STACK_TEXT:  
    99d36ba8 82c5eab3 a0d6b5c8 a0d6b5a8 86b2daa8 nt!CmpRemoveKeyHash+0x17
    99d36bbc 82cdb66f 00000001 8d0f2968 9823c000 nt!CmpCleanUpKcbCacheWithLock+0x53
    99d36bf0 82cdbc76 982339d0 00000000 00000001 nt!CmpCleanUpKCBCacheTable+0x16f
    99d36c24 82cd3e15 00000000 00000000 b4a60bea nt!CmpSearchForOpenSubKeys+0x29
    99d36d14 82cd2381 00000000 00000000 86b2daa8 nt!NtUnloadKey2+0x330
    99d36d28 82a8944a 00e2f89c 00e2fadc 775064f4 nt!NtUnloadKey+0x10
    99d36d28 775064f4 00e2f89c 00e2fadc 775064f4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00e2fadc 00000000 00000000 00000000 00000000 0x775064f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!CmpRemoveKeyHash+17
    82c5eaf7 f7b12c030000    div     eax,dword ptr [ecx+32Ch]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpRemoveKeyHash+17
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    FAILURE_BUCKET_ID:  0x8E_nt!CmpRemoveKeyHash+17
    
    BUCKET_ID:  0x8E_nt!CmpRemoveKeyHash+17
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\122310-21746-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82a3c000 PsLoadedModuleList = 0x82b84810
    Debug session time: Thu Dec 23 00:47:40.501 2010 (UTC - 5:00)
    System Uptime: 0 days 0:01:24.342
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    .....
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 001904fb
    Arg2: 8e30ba40
    Arg3: 8e30b620
    Arg4: 8c2dae78
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  8e30ba40 -- (.exr 0xffffffff8e30ba40)
    ExceptionAddress: 8c2dae78 (Ntfs!NtfsRemoveFcbFromSharedResourceList+0x0000002c)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 00033000
    Attempt to read from address 00033000
    
    CONTEXT:  8e30b620 -- (.cxr 0xffffffff8e30b620)
    eax=00000000 ebx=82aa67a3 ecx=00000000 edx=00000000 esi=00033000 edi=887ed180
    eip=8c2dae78 esp=8e30bb08 ebp=8e30bb14 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    Ntfs!NtfsRemoveFcbFromSharedResourceList+0x2c:
    8c2dae78 8b06            mov     eax,dword ptr [esi]  ds:0023:00033000=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  00033000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82ba4718
    Unable to read MiSystemVaType memory at 82b84160
     00033000 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsRemoveFcbFromSharedResourceList+2c
    8c2dae78 8b06            mov     eax,dword ptr [esi]
    
    FAULTING_IP: 
    Ntfs!NtfsRemoveFcbFromSharedResourceList+2c
    8c2dae78 8b06            mov     eax,dword ptr [esi]
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from 8c2d7b5f to 8c2dae78
    
    STACK_TEXT:  
    8e30bb14 8c2d7b5f ffff7400 a5f69008 00000000 Ntfs!NtfsRemoveFcbFromSharedResourceList+0x2c
    8e30bb40 8c243174 887ed180 8e30bb70 8e30bb7a Ntfs!NtfsDeleteFcb+0x6c
    8e30bb94 8c2bf15d 887ed180 861780d8 a5f69008 Ntfs!NtfsTeardownFromLcb+0x24f
    8e30bbe4 8c23bbec 887ed180 a5f690f8 01f692a0 Ntfs!NtfsTeardownStructures+0xf3
    8e30bc0c 8c2bb55b 887ed180 a5f690f8 a5f692a0 Ntfs!NtfsDecrementCloseCounts+0xaf
    8e30bc6c 8c2da4c3 887ed180 a5f690f8 a5f69008 Ntfs!NtfsCommonClose+0x4f2
    8e30bd00 82aa9f3b 00000000 00000000 85367a70 Ntfs!NtfsFspClose+0x118
    8e30bd50 82c4a6d3 00000000 a287e760 00000000 nt!ExpWorkerThread+0x10d
    8e30bd90 82afc0f9 82aa9e2e 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsRemoveFcbFromSharedResourceList+2c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff8e30b620 ; kb
    
    FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsRemoveFcbFromSharedResourceList+2c
    
    BUCKET_ID:  0x24_Ntfs!NtfsRemoveFcbFromSharedResourceList+2c
    
    Followup: MachineOwner
    ---------


    Drivers:

    Code:
    start    end        module name
    930bb000 930e7000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8c0a2000 8c0ea000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    91f44000 91f9e000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    92612000 92624000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8c00e000 8c017000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    8c1c5000 8c1ce000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8c1ce000 8c1f1000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    92634000 92cc7000   atikmdag atikmdag.sys Tue Oct 26 22:26:21 2010 (4CC78DCD)
    920df000 9211c000   atikmpag atikmpag.sys Tue Oct 26 22:14:03 2010 (4CC78AEB)
    82620000 826bd000   ATSwpWDF ATSwpWDF.sys Tue Nov 24 09:01:43 2009 (4B0BE747)
    8c149000 8c154000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    92e0e000 93075000   bcmwl6   bcmwl6.sys   Tue Jul 07 20:44:47 2009 (4A53EBFF)
    91897000 9189e000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    920b0000 920be000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    8beb7000 8bebf000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    99090000 990a9000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    98520000 9853e000   cdd      cdd.dll      unavailable (00000000)
    8c411000 8c430000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    8bf01000 8bfac000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    921e7000 921f5000   circlass circlass.sys Mon Jul 13 19:51:17 2009 (4A5BC875)
    8c5b0000 8c5d5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    8bebf000 8bf01000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    931eb000 931ee700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8c396000 8c3f3000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8c141000 8c149000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    92e00000 92e0d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    96d53000 96d60000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    92034000 92098000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    826fd000 82712000   DefragFS DefragFS.SYS Wed Aug 19 13:31:36 2009 (4A8C36F8)
    92098000 920b0000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    919c9000 919d5000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8c59f000 8c5b0000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    96cf0000 96d09000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    96d60000 96d6b000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    96d75000 96d86000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    96d6b000 96d75000   dump_msahci dump_msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    96d49000 96d53000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    92cc7000 92d7e000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    92d7e000 92db7000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8bfe0000 8bff1000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8bfac000 8bfe0000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8c20e000 8c217000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8c56d000 8c59f000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    8c786000 8c7b7000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    82a05000 82a3c000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    92db7000 92dd6000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    96c71000 96cc1000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    96d18000 96d2b000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    96d09000 96d18000   hidir    hidir.sys    Mon Jul 13 19:51:04 2009 (4A5BC868)
    96d2b000 96d31480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    826bd000 826c8000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    9900b000 99090000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8c635000 8c63d000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    93151000 93169000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    92600000 92612000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    9317f000 931de000   itecir   itecir.sys   Tue Jul 13 05:17:04 2010 (4C3C2F10)
    9307f000 930bb000   k57nd60x k57nd60x.sys Sun Apr 26 07:23:19 2009 (49F44427)
    931de000 931eb000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    96d32000 96d3e000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
    80bb6000 80bbe000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    91a24000 91f44000   kl1      kl1.sys      Tue Sep 01 07:29:07 2009 (4A9D0583)
    8c560000 8c56d000   klbg     klbg.sys     Wed Oct 14 13:18:07 2009 (4AD607CF)
    9183f000 91890000   klif     klif.sys     Wed Nov 11 08:32:39 2009 (4AFABCF7)
    91a11000 91a18000   klim6    klim6.sys    Mon Sep 14 06:46:22 2009 (4AAE1EFE)
    93169000 93172000   klmouflt klmouflt.sys Fri Oct 02 11:38:31 2009 (4AC61E77)
    92000000 92034000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
    8c383000 8c396000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8c52b000 8c550000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    82712000 82722000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    826c8000 826e3000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    8be2e000 8bea6000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    96dc3000 96dce000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    93172000 9317f000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    96d3e000 96d49000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8c1af000 8c1c5000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    990a9000 990bb000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    990bb000 990de000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    990de000 99119000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    99119000 99134000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    8c1f1000 8c1fb000   msahci   msahci.sys   Mon Jul 13 19:45:50 2009 (4A5BC72E)
    918f0000 918fb000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8c0f3000 8c0fb000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8c358000 8c383000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    919bf000 919c9000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8c550000 8c560000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8c436000 8c4ed000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    92624000 9262f000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    82768000 82778000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    9217f000 921a1000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    96c60000 96c71000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    9192b000 91939000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    91f9e000 91fd0000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    8c4ed000 8c52b000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    918fb000 91909000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    91ff6000 92000000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82a3c000 82e4c000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
    8c229000 8c358000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    91890000 91897000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    82722000 82768000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    91fd7000 91ff6000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    8c130000 8c141000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    8c0fb000 8c125000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8c000000 8c00e000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8c200000 8c20e000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9914c000 991e3000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    96cc1000 96cf0000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    8bea6000 8beb7000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    92167000 9217f000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    921a1000 921b9000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    921b9000 921d0000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    921d0000 921e7000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    9197e000 919bf000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    92df0000 92dfa000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    918d8000 918e0000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    918e0000 918e8000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    918e8000 918f0000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8c608000 8c635000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    93100000 93151000   rixdptsk rixdptsk.sys Tue Nov 14 20:35:19 2006 (455A6ED7)
    82778000 8278b000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    91a18000 91a1e000   SASDIFSV SASDIFSV.SYS Wed Feb 17 13:19:19 2010 (4B7C3327)
    9195c000 9197e000   SASKUTIL SASKUTIL.SYS Mon May 10 13:15:22 2010 (4BE83F2A)
    930e7000 93100000   sdbus    sdbus.sys    Fri Oct 09 22:31:24 2009 (4ACFF1FC)
    991e3000 991ed000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8c600000 8c608000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    9a411000 9a462000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
    827ac000 827fb000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
    8278b000 827ac000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
    931f8000 931f9380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8c63d000 8c786000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    991ed000 991fa000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    91920000 9192b000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    91909000 91920000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    9194c000 9195c000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    984f0000 984f9000   TSDDD    TSDDD.dll    unavailable (00000000)
    920be000 920df000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    919d5000 919e3000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    96d86000 96d9d000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    96d9d000 96d9e700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    92de1000 92df0000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    96c1c000 96c60000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    9211c000 92167000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    92dd6000 92de1000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    96d9f000 96dc2b80   usbvideo usbvideo.sys Wed Mar 03 23:04:40 2010 (4B8F3158)
    8c125000 8c130000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    9189e000 918aa000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    918aa000 918cb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8c7b7000 8c7bf380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    8c154000 8c164000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8c164000 8c1af000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8c7c0000 8c7ff000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    93075000 9307f000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    91a00000 91a11000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    91939000 9194c000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    918cb000 918d8000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8c023000 8c094000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8c094000 8c0a2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    91fd0000 91fd7000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    98290000 984db000   win32k   win32k.sys   unavailable (00000000)
    931ef000 931f8000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:19:16 2009 (4A5BC0F4)
    8c0ea000 8c0f3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    826e3000 826fd000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    99134000 9914c000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    8c5d5000 8c5e2000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    8c5e2000 8c5ed000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    8c5ed000 8c5f7000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    8c400000 8c411000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
      My Computer


  3. Posts : 8
    windows 7 ultimate 32bit
    Thread Starter
       #3

    Thank you for your response. I uninstalled Kaspersky, which I like and was wondering if I could ever install again because I've used it for years and it never let me down. I also uninstalled SuperAntiSpyware which I like as well.

    Also, I updated the drivers like you asked. What's next?
    Last edited by thegromble; 23 Dec 2010 at 12:42.
      My Computer


  4. Posts : 8
    windows 7 ultimate 32bit
    Thread Starter
       #4

    bump

    It only crashed twice today, which is a big improvement. The memory_management bsod came up though. How can this be fixed?
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 23:11.
Find Us