Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD + random crash

03 Feb 2011   #1
eim

Windows 7 Ultimate x64
 
 
BSOD + random crash

I'm having problem with random program crashes and sometimes even BSOD.
Somedays my PC feels like an old 286....

Is there anybody out there who can help me find out whats causing it?

Tnx for any tips.

My System SpecsSystem Spec
.

03 Feb 2011   #2
eim

Windows 7 Ultimate x64
 
 

Forgot to say... i have been running Memtest86, intelburn, Prime for hours... no problems found :/
My System SpecsSystem Spec
03 Feb 2011   #3

Windows 7 Ultimate 32 bit
 
 

I looked at your four most recent dumps. Each has a different bugcheck code. That usually indicates a hardware or hardware related problem. The dumps blame various Windows system files, which are very unlikely to be the real causes.

1. I recommend that you uninstall Daemon Tools. It is notorious for causing BSOD's on Win 7 systems.

2. After you uninstall Daemon Tools, please enable Driver Verifier carefully following the instructions in this tutotial: Driver Verifier - Enable and Disable. If Driver Verifier encounters a faulty driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps.


Code:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50
Debug session time: Wed Jan 26 19:34:10.351 2011 (GMT-5)
System Uptime: 0 days 0:00:16.444
Loading Kernel Symbols
...............................................................
.......................................
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000096, fffff880053e2e00, fffff8800335adf8, fffff8800335a660}

Probably caused by : rasl2tp.sys ( rasl2tp!GetRegistrySettings+2d0 )

Followup: MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff880053e2e00, The address that the exception occurred at
Arg3: fffff8800335adf8, Exception Record Address
Arg4: fffff8800335a660, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION}  Privileged instruction.

FAULTING_IP: 
rasl2tp!GetRegistrySettings+2d0
fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]

EXCEPTION_RECORD:  fffff8800335adf8 -- (.exr 0xfffff8800335adf8)
ExceptionAddress: fffff880053e2e00 (rasl2tp!GetRegistrySettings+0x00000000000002d0)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  fffff8800335a660 -- (.cxr 0xfffff8800335a660)
rax=fffff880053e3550 rbx=000000000000001c rcx=f8800147b0d30000
rdx=fffff88003174000 rsi=fffff8800335b17c rdi=0000000000000022
rip=fffff880053e2e00 rsp=fffff8800335b030 rbp=0000000000000000
 r8=fffffa800688a070  r9=0000000000000030 r10=fffff80002a5f000
r11=000000000000072d r12=0000000000000010 r13=000000000000001a
r14=000000000000001e r15=0000000000000018
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
rasl2tp!GetRegistrySettings+0x2d0:
fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION}  Privileged instruction.

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  STATUS_PRIVILEGED_INSTRUCTION

LOCK_ADDRESS:  fffff80002cd3400 -- (!locks fffff80002cd3400)

Resource @ nt!PiEngineLock (0xfffff80002cd3400)    Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
    Lock address  : 0xfffff80002cd3400
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff880053e26ee to fffff880053e2e00

STACK_TEXT:  
fffff880`0335b030 fffff880`053e26ee : fffffa80`06bb8a5c fffffa80`06bb8a58 fffffa80`06bb8a40 fffff800`02dd82c0 : rasl2tp!GetRegistrySettings+0x2d0
fffff880`0335b0c0 fffff880`014c0f61 : ffffffff`00000000 00000000`00000005 fffffa80`0672ef70 00000000`000007ff : rasl2tp!LmpInitialize+0x1ee
fffff880`0335b270 fffff880`014bb793 : fffffa80`05ea19d0 fffffa80`066c4020 00000000`00000000 01cbbdb9`ea0d04c4 : ndis! ?? ::LNCPHCLB::`string'+0x2f0d
fffff880`0335b630 fffff880`014bd86c : fffffa80`05ea19d0 fffffa80`066c2050 00000000`00000000 fffffa80`04f56700 : ndis!ndisInitializeAdapter+0x113
fffff880`0335b690 fffff880`014bb466 : fffffa80`066c21a0 fffffa80`05ea19d0 00000000`00000000 fffffa80`05ea19d0 : ndis!ndisPnPStartDevice+0xac
fffff880`0335b6f0 fffff800`02e8e06e : 00000000`00000000 fffffa80`05ea19d0 fffffa80`066c2050 fffff880`0335b820 : ndis!ndisPnPDispatch+0x246
fffff880`0335b790 fffff800`02bc914d : fffffa80`04f56700 fffffa80`06bafbf0 fffff800`02bced30 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`0335b7d0 fffff800`02e98db6 : fffff800`02cd31c0 fffffa80`04f56430 fffffa80`06bafbf0 fffffa80`04f565d8 : nt!PnpStartDevice+0x11d
fffff880`0335b890 fffff800`02e99054 : fffffa80`04f56430 fffffa80`04f30019 fffffa80`04f36350 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`0335b920 fffff800`02ebc346 : fffffa80`04f56430 fffffa80`04f36350 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`0335b950 fffff800`02ebc7fc : fffffa80`063bd050 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296
fffff880`0335bbc0 fffff800`02bd1382 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`0335bc10 fffff800`02adc961 : fffff800`02bd1080 fffff800`02f26e01 fffffa80`04f06b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`0335bcb0 fffff800`02d73c06 : 00000000`00000000 fffffa80`04f06b60 00000000`00000080 fffffa80`04e899e0 : nt!ExpWorkerThread+0x111
fffff880`0335bd40 fffff800`02aadc26 : fffff880`03167180 fffffa80`04f06b60 fffff880`031720c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0335bd80 00000000`00000000 : fffff880`0335c000 fffff880`03356000 fffff880`033596d0 00000000`00000000 : nt!KxStartSystemThread+0x16


FOLLOWUP_IP: 
rasl2tp!GetRegistrySettings+2d0
fffff880`053e2e00 4c8d4c2448      lea     r9,[rsp+48h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  rasl2tp!GetRegistrySettings+2d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rasl2tp

IMAGE_NAME:  rasl2tp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcce3

STACK_COMMAND:  .cxr 0xfffff8800335a660 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_rasl2tp!GetRegistrySettings+2d0

BUCKET_ID:  X64_0x7E_rasl2tp!GetRegistrySettings+2d0

Followup: MachineOwner
---------

Debug session time: Fri Jan 28 02:26:44.532 2011 (GMT-5)
System Uptime: 0 days 1:27:13.625
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880096c1668, fffff880096c0ed0, fffff80002a954b4}

Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireFcbWithPaging+13b )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880096c1668
Arg3: fffff880096c0ed0
Arg4: fffff80002a954b4

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880096c1668 -- (.exr 0xfffff880096c1668)
ExceptionAddress: fffff80002a954b4 (nt!ExAcquireResourceExclusiveLite+0x0000000000000054)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 00000000000000a0
Attempt to write to address 00000000000000a0

CONTEXT:  fffff880096c0ed0 -- (.cxr 0xfffff880096c0ed0)
rax=fffffa8005b60401 rbx=0000000000000040 rcx=0000000000000040
rdx=0000000000000001 rsi=0000000000000000 rdi=fffff880009b1180
rip=fffff80002a954b4 rsp=fffff880096c18a0 rbp=0000000000000001
 r8=0000000000000702  r9=0000000000000008 r10=0000000000020000
r11=fffff880096c1968 r12=0000000000000000 r13=00000000c00000d8
r14=fffffa8005b60440 r15=0000000000010001
iopl=0         nv up di pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010046
nt!ExAcquireResourceExclusiveLite+0x54:
fffff800`02a954b4 f0480fba696000  lock bts qword ptr [rcx+60h],0 ds:002b:00000000`000000a0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Dropbox.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  00000000000000a0

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
 00000000000000a0 

FOLLOWUP_IP: 
Ntfs!NtfsAcquireFcbWithPaging+13b
fffff880`0123810b 84c0            test    al,al

FAULTING_IP: 
nt!ExAcquireResourceExclusiveLite+54
fffff800`02a954b4 f0480fba696000  lock bts qword ptr [rcx+60h],0

BUGCHECK_STR:  0x24

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff8800123810b to fffff80002a954b4

STACK_TEXT:  
fffff880`096c18a0 fffff880`0123810b : 00000000`c00000d8 00000000`00000009 00000000`00000000 00000000`00000090 : nt!ExAcquireResourceExclusiveLite+0x54
fffff880`096c1910 fffff880`012ac61d : 00000000`00000000 fffffa80`05b7e820 fffffa80`05b8cd80 00010000`00031401 : Ntfs!NtfsAcquireFcbWithPaging+0x13b
fffff880`096c1970 fffff880`012cfb04 : fffff880`09fc54b0 fffffa80`05b7e820 fffffa80`05b8cd80 00000000`00000000 : Ntfs!NtfsOpenFile+0xaf1
fffff880`096c1b50 fffff880`01238c0d : fffffa80`05b8cd80 fffffa80`05b7e820 fffff880`09fc54b0 fffffa80`05b60400 : Ntfs!NtfsCommonCreate+0xc54
fffff880`096c1d30 fffff800`02a855c7 : fffff880`09fc5420 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`096c1d60 fffff800`02a85581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`09fc52f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsAcquireFcbWithPaging+13b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff880096c0ed0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b

BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b

Followup: MachineOwner
---------

Debug session time: Wed Feb  2 04:31:03.930 2011 (GMT-5)
System Uptime: 0 days 0:12:28.022
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff8800406212a}

Probably caused by : csc.sys ( csc!CscCleanupFobx+2a )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800406212a

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002a89ca9 to fffff80002a8a740

STACK_TEXT:  
fffff880`009b7de8 fffff800`02a89ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009b7df0 fffff800`02a88172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009b7f30 fffff880`0406212a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`096a7fa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : csc!CscCleanupFobx+0x2a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
csc!CscCleanupFobx+2a
fffff880`0406212a 4889442450      mov     qword ptr [rsp+50h],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  csc!CscCleanupFobx+2a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: csc

IMAGE_NAME:  csc.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc22a

FAILURE_BUCKET_ID:  X64_0x7f_8_csc!CscCleanupFobx+2a

BUCKET_ID:  X64_0x7f_8_csc!CscCleanupFobx+2a

Followup: MachineOwner
---------

Debug session time: Wed Feb  2 17:20:19.385 2011 (GMT-5)
System Uptime: 0 days 0:02:23.478
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002d5674d, fffff88008f36770, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d5674d, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88008f36770, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!CmpKcbCacheLookup+1dd
fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch]

CONTEXT:  fffff88008f36770 -- (.cxr 0xfffff88008f36770)
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000b04
rdx=0000000009e2c4b4 rsi=fffff8a000919a18 rdi=fffff88008f372c0
rip=fffff80002d5674d rsp=fffff88008f37140 rbp=fffff8a000919420
 r8=0000000000000009  r9=0000000000000000 r10=0000000000000004
r11=fffff88008f372c0 r12=fffff8a0012ca4a8 r13=0000000000000020
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!CmpKcbCacheLookup+0x1dd:
fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch] ds:002b:00000000`00000014=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002d5674d

STACK_TEXT:  
fffff880`08f37140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpKcbCacheLookup+0x1dd


FOLLOWUP_IP: 
nt!CmpKcbCacheLookup+1dd
fffff800`02d5674d 418b45f4        mov     eax,dword ptr [r13-0Ch]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CmpKcbCacheLookup+1dd

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c44a9

STACK_COMMAND:  .cxr 0xfffff88008f36770 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd

BUCKET_ID:  X64_0x3B_nt!CmpKcbCacheLookup+1dd

Followup: MachineOwner
---------

0: kd> lmtsmn
start             end                 module name
fffff880`06c6e000 fffff880`06cac000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f9d000 fffff880`00ff4000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c74000 fffff880`02cfe000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06cc5000 fffff880`06cdb000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ddf000 fffff880`00dea000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00cda000 fffff880`00ce3000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db5000 fffff880`00ddf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00900000 fffff960`00961000   ATMFD    ATMFD.DLL    Tue Oct 19 23:05:45 2010 (4CBE5C89)
fffff880`0191c000 fffff880`01923000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d81000 fffff880`03d92000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`074c8000 fffff880`074e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006b0000 fffff960`006d7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018b8000 fffff880`018e2000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01852000 fffff880`01882000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d57000 fffff880`00db5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0117f000 fffff880`011f2000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`06cb5000 fffff880`06cc5000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`070d1000 fffff880`070da000   cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0)
fffff880`089a9000 fffff880`089b7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ce0000 fffff880`03d63000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d63000 fffff880`03d81000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`019c8000 fffff880`019d7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0120a000 fffff880`01220000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`08975000 fffff880`08997000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02d81000 fffff880`02dc4000   dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C)
fffff880`0938f000 fffff880`09398000   DUMETR64 DUMETR64.SYS Thu Aug 19 15:13:29 2010 (4C6D8259)
fffff880`089c3000 fffff880`089cc000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`089b7000 fffff880`089c3000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`089cc000 fffff880`089df000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0899d000 fffff880`089a9000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`10acd000 fffff880`10bc1000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03c02000 fffff880`03c48000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0110d000 fffff880`01121000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010c1000 fffff880`0110d000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01086000 fffff880`010c0000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02fe6000 fffff800`0302f000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0fe00000 fffff880`0fe24000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0860e000 fffff880`08627000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`08627000 fffff880`0862f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`08600000 fffff880`0860e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`07400000 fffff880`074c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f5000 fffff880`015fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03db8000 fffff880`03dce000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`06d9b000 fffff880`06daa000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`08630000 fffff880`0863e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bb1000 fffff800`00bbb000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`01800000 fffff880`01843000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013cc000 fffff880`013e6000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`08997000 fffff880`0899c200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`06dec000 fffff880`06defd80   LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`09238000 fffff880`0923a480   LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0)
fffff880`0756a000 fffff880`0757f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`08659000 fffff880`0867c000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cff000 fffff880`00d43000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`0863e000 fffff880`0864c000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`06daa000 fffff880`06db9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0864c000 fffff880`08659000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`018e2000 fffff880`01913000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`070da000 fffff880`070ea000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`07597000 fffff880`075af000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`075af000 fffff880`075dc000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`07060000 fffff880`070ae000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`070ae000 fffff880`070d1000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01981000 fffff880`0198c000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01121000 fffff880`0117f000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c5d000 fffff880`02c68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0148d000 fffff880`0149f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014a3000 fffff880`01595000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`06cff000 fffff880`06d0b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`06d0b000 fffff880`06d3a000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`07555000 fffff880`0756a000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d72000 fffff880`02d81000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02cfe000 fffff880`02d43000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01595000 fffff880`015f5000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`09398000 fffff880`093ad000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0198c000 fffff880`0199d000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a0a000 fffff800`02fe6000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01229000 fffff880`013cc000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01913000 fffff880`0191c000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`06dcb000 fffff880`06de4000   nusb3hub nusb3hub.sys Thu Nov 18 20:34:24 2010 (4CE5D420)
fffff880`03dce000 fffff880`03dff000   nusb3xhc nusb3xhc.sys Thu Nov 18 20:34:25 2010 (4CE5D421)
fffff880`10acb000 fffff880`10acc180   nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe39000 fffff880`10acae00   nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02d4c000 fffff880`02d72000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e4a000 fffff880`00e5f000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e0a000 fffff880`00e3d000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ed0000 fffff880`00ed7000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ed7000 fffff880`00ee7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013e6000 fffff880`013f7000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`070ea000 fffff880`07190000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`08938000 fffff880`08975000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d43000 fffff880`00d57000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`06cdb000 fffff880`06cff000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`06d3a000 fffff880`06d55000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`06d55000 fffff880`06d76000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`06d76000 fffff880`06d90000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02c00000 fffff880`02c51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`06d90000 fffff880`06d9b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01966000 fffff880`0196f000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`093ad000 fffff880`093db000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`0196f000 fffff880`01978000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01978000 fffff880`01981000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`09200000 fffff880`09238000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`0104c000 fffff880`01086000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`0757f000 fffff880`07597000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06c08000 fffff880`06c6e000   Rt64win7 Rt64win7.sys Fri Dec 24 02:30:25 2010 (4D144C11)
fffff880`086dc000 fffff880`08937d80   RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93)
fffff880`07190000 fffff880`0719b000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01485000 fffff880`0148d000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`092f9000 fffff880`0938f000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`09292000 fffff880`092f9000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`0719b000 fffff880`071c8000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`06dea000 fffff880`06deb480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`071c8000 fffff880`071da000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`019bb000 fffff880`019c8000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`093db000 fffff880`093e6000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`0199d000 fffff880`019bb000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02ddf000 fffff880`02df3000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005e0000 fffff960`005ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`093e6000 fffff880`093f5000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`03d92000 fffff880`03db8000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`06db9000 fffff880`06dcb000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`089df000 fffff880`089fc000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`03c00000 fffff880`03c01f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`10bce000 fffff880`10bdf000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`074fb000 fffff880`07555000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03c48000 fffff880`03c9e000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`10bc1000 fffff880`10bce000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00e3d000 fffff880`00e4a000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01923000 fffff880`01931000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01931000 fffff880`01956000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01475000 fffff880`01485000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e5f000 fffff880`00e74000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e74000 fffff880`00ed0000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02dc4000 fffff880`02ddf000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01956000 fffff880`01966000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eea000 fffff880`00f8e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8e000 fffff880`00f9d000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d43000 fffff880`02d4c000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`06cac000 fffff880`06cb5000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ff4000 fffff880`00ffd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0867c000 fffff880`0869d000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`0869d000 fffff880`086ce000   WUDFRd   WUDFRd.sys   Mon Jul 13 20:06:06 2009 (4A5BCBEE)

Unloaded modules:
fffff880`01882000 fffff880`01890000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01890000 fffff880`0189c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`0189c000 fffff880`018a5000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`018a5000 fffff880`018b8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06db9000 fffff880`06dea000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`06db9000 fffff880`06dea000   WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
.


04 Feb 2011   #4
eim

Windows 7 Ultimate x64
 
 

Uninstalled DeamonTools and Enabled Driver Verifier, havent noticed anything yet.

Tnx for having a look, i think i will delete all logs and test it for a while. Perhaps i'll return with a new minidump
My System SpecsSystem Spec
04 Feb 2011   #5

Windows 7 Ultimate 32 bit
 
 

After you run Verifier for about 36 hours, you can turn it off. I hope you'll return WITHOUT a mini dump to say your system is running smoothly!
My System SpecsSystem Spec
05 Feb 2011   #6
eim

Windows 7 Ultimate x64
 
 
i'm back...

Oh no!
Booted up the computer, it gave me a BSOD for a few sec...
I made a new minidump, is there any useful information?

All help is much appriciated

(System Specs - See below)
My System SpecsSystem Spec
05 Feb 2011   #7

Windows 7 Ultimate 32 bit
 
 

This is a Driver Verifier enabled dump and it blames ntfs.sys which is the Windows file system driver and unlikely to be the real cause. You can turn off Driver Verifier for now. Because ntfs.sys was blamed. I suggest you check your file system with CheckDisk -
Quote:
Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.

Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"

CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7) (winlogon for XP).

Copy/paste the results into your next post.


Code:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02ca4e50
Debug session time: Sat Feb  5 03:52:37.696 2011 (GMT-5)
System Uptime: 0 days 0:00:15.788
Loading Kernel Symbols
...............................................................
......................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880033609a8, fffff88003360210, fffff80002af72b3}

Probably caused by : Ntfs.sys ( Ntfs!NtfsNonCachedIo+23f )

Followup: MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880033609a8
Arg3: fffff88003360210
Arg4: fffff80002af72b3

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880033609a8 -- (.exr 0xfffff880033609a8)
ExceptionAddress: fffff80002af72b3 (nt!IopCompleteRequest+0x0000000000000ae3)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88003360210 -- (.cxr 0xfffff88003360210)
rax=fffff88003361f80 rbx=fffff980034b0ee0 rcx=0000bcfa00520050
rdx=0000bcfa00520050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002af72b3 rsp=fffff88003360be0 rbp=0000000000000000
 r8=fffff88003360ce8  r9=fffff88003360ce0 r10=0000000000000002
r11=fffff80002af67d0 r12=fffff88003361f78 r13=0000000000000000
r14=fffffa8004f26680 r15=fffff8800316a180
iopl=0         nv up ei pl nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010203
nt!IopCompleteRequest+0xae3:
fffff800`02af72b3 488b09          mov     rcx,qword ptr [rcx] ds:002b:0000bcfa`00520050=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0f0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsNonCachedIo+23f
fffff880`0122405f 498b4d78        mov     rcx,qword ptr [r13+78h]

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02af72b3 488b09          mov     rcx,qword ptr [rcx]

BUGCHECK_STR:  0x24

IRP_ADDRESS:  ffffffffffffff89

LAST_CONTROL_TRANSFER:  from fffff80002ab40c7 to fffff80002af72b3

STACK_TEXT:  
fffff880`03360be0 fffff800`02ab40c7 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`03360cb0 fffff800`02adeb9d : fffffa80`04f26680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`03360d30 fffff800`02ae0cff : fffff880`03361200 fffffa80`06ed0040 00000000`00000000 fffff880`03360f60 : nt!KiCommitThreadWait+0x3dd
fffff880`03360dc0 fffff880`0122405f : fffffa80`06f61500 00000000`00000000 fffff8a0`04046500 fffff800`02af3d00 : nt!KeWaitForSingleObject+0x19f
fffff880`03360e60 fffff880`01227526 : fffff880`03361200 fffff980`034d8c60 fffff8a0`040465a0 fffff8a0`04046470 : Ntfs!NtfsNonCachedIo+0x23f
fffff880`03361030 fffff880`01229f78 : fffff880`03361200 fffff980`034d8c60 fffff880`03361301 fffffa80`06f62001 : Ntfs!NtfsCommonRead+0x7a6
fffff880`033611d0 fffff800`02f7dc16 : fffff980`034d8c60 fffff980`034d8c60 fffffa80`06f62030 fffffa80`0734d8f0 : Ntfs!NtfsFsdRead+0x1b8
fffff880`033613d0 fffff880`0104b23f : fffff980`034d8fb8 fffff880`03361480 fffffa80`07276870 fffffa80`0734d8f0 : nt!IovCallDriver+0x566
fffff880`03361430 fffff880`010496df : fffffa80`06d55de0 fffffa80`06d55de0 fffffa80`06d55d00 fffff980`034d8c60 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`033614c0 fffff800`02f7dc16 : fffff980`034d8c60 00000000`00000002 fffffa80`074ab070 fffffa80`05148c98 : fltmgr!FltpDispatch+0xcf
fffff880`03361520 fffff800`02ac91f2 : fffff980`034d8c80 00000000`00000043 fffff980`034d8c60 fffffa80`0734d9c0 : nt!IovCallDriver+0x566
fffff880`03361580 fffff800`02d9afb0 : fffffa80`074ab000 fffffa80`074ab000 00000000`00000001 00000000`00184be3 : nt!IoPageRead+0x252
fffff880`03361610 fffff800`02dd2c75 : fffffa80`074ab070 00000000`00000000 00000000`00000022 fffff880`033618c0 : nt!MiCreateImageFileMap+0x170
fffff880`03361840 fffff800`02dc8013 : fffff880`03361aa0 00000000`00000000 fffff880`03361d58 fffff880`03361a98 : nt!MmCreateSection+0x7a9
fffff880`03361a50 fffff800`02ad6993 : fffffa80`04f26680 fffff880`03361cf8 fffff880`03361ae8 00000000`00000000 : nt!NtCreateSection+0x162
fffff880`03361ad0 fffff800`02ad2f30 : fffff800`02eb08b6 fffffa80`04f26680 fffff880`03361d80 00000000`00000004 : nt!KiSystemServiceCopyEnd+0x13
fffff880`03361cd8 fffff800`02eb08b6 : fffffa80`04f26680 fffff880`03361d80 00000000`00000004 00000000`00000030 : nt!KiServiceLinkage
fffff880`03361ce0 fffff800`02eb0c7c : ffffffff`80000210 00000000`00100000 fffff880`03361e00 fffff800`02ad593d : nt!MmCheckSystemImage+0x96
fffff880`03361e10 fffff800`02eb0e97 : ffffffff`80000210 00001f80`00000001 fffff8a0`04046cc0 00000000`00000000 : nt!MiCreateSectionForDriver+0xcc
fffff880`03361ec0 fffff800`02ebc73a : 00000000`00000000 fffff880`03362080 fffffa80`04f26680 00000000`00000000 : nt!MiObtainSectionForDriver+0xd7
fffff880`03361f20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x23a


SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!NtfsNonCachedIo+23f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff88003360210 ; kb

FAILURE_BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f

BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f

Followup: MachineOwner
---------
My System SpecsSystem Spec
06 Feb 2011   #8
eim

Windows 7 Ultimate x64
 
 

Here is the CHKDSK LogFiles. In swedish... (was about to run it in google translate, but i gues that would mess it up even more)
Is there any usful information?


Code:
 
Kontrollerar filsystemet på C:
Filsystemet är av typen NTFS.
En diskkontroll har schemalagts.
Disken kommer nu att kontrolleras. 
CHKDSK verifierar filer (steg 1 av 5)...
119552 filposter har behandlats. Filverifieringen är klar.
183 stora filposter har behandlats. 0 skadade filposter har behandlats. 2 EA-poster har behandlats. 71 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)...
Det går inte att hitta filnamnsattributet för indexposten MINABI~
för indexet $I30 med den överordnade filen 0x207 i filen 0x242.
Tar bort indexposten MINABI~ i indexet $I30 i filen 519.
164958 indexposter har behandlats. Indexverifieringen är klar.
CHKDSK läser oindexerade filer för återanslutning till den ursprungliga katalogen.
1 oindexerade filer har genomsökts. Återställer den överblivna filen MINABI~1 (578) till katalogfilen 519.
0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)...
119552 fil-SD/SID-poster har behandlats. Rensar upp 303 oanvända indexposter från indexet $SII i filen 0x9.
Rensar upp 303 oanvända indexposter från indexet $SDH i filen 0x9.
Rensar upp 303 oanvända säkerhetsbeskrivare.
Verifieringen av säkerhetsbeskrivare är klar.
22704 datafiler har behandlats. CHKDSK verifierar USN-journalen...
37511560 USN-byte har behandlats. Verifieringen av USN-journalen är klar.
CHKDSK verifierar fildata (steg 4 av 5)...
119536 filer har behandlats. Verifieringen av filinformationen är klar.
CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)...
49933708 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar.
Korrigeringar har gjorts i filsystemet.
244089855 kB diskutrymme totalt.
44068232 kB i 91878 filer.
56776 kB i 22705 index.
0 kB i skadade sektorer.
230011 kB används av operativsystemet.
65536 kB hårddisksutrymme används av loggfilen.
199734836 kB ledigt utrymme.
4096 byte i varje allokeringsenhet.
61022463 allokeringsenheter finns totalt på disken.
49933709 allokeringsenheter är tillgängliga på disken.
Intern information:
00 d3 01 00 a2 bf 01 00 1d 62 03 00 00 00 00 00 .........b......
f7 00 00 00 47 00 00 00 00 00 00 00 00 00 00 00 ....G...........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Kontrollen av disken har slutförts.
Vänta medan datorn startas om.

Code:
 
Chkdsk kördes i läs- och skrivläge. 
Kontrollerar filsystemet på D:
Filsystemet är av typen NTFS.
Det går inte att låsa aktuell enhet.
Det går inte att köra CHKDSK eftersom volymen används av en annan process.
Kommandot CHKDSK kan köras om volymen demonteras först.
ALLA ÖPPNA REFERENSER TILL VOLYMEN BLIR OGILTIGA.
Vill du tvinga fram en demontering av den här volymen? (J/N) Volymen är demonterad. Alla öppna referenser till volymen är nu ogiltiga.
Volymetiketten är Ny volym.
CHKDSK verifierar filer (steg 1 av 5)...
246272 filposter har behandlats. Filverifieringen är klar.
2 stora filposter har behandlats. 0 skadade filposter har behandlats. 0 EA-poster har behandlats. 0 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)...
251406 indexposter har behandlats. Indexverifieringen är klar.
0 oindexerade filer har genomsökts. 0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)...
246272 fil-SD/SID-poster har behandlats. Rensar upp 23 oanvända indexposter från indexet $SII i filen 0x9.
Rensar upp 23 oanvända indexposter från indexet $SDH i filen 0x9.
Rensar upp 23 oanvända säkerhetsbeskrivare.
Verifieringen av säkerhetsbeskrivare är klar.
2567 datafiler har behandlats. CHKDSK verifierar fildata (steg 4 av 5)...
246256 filer har behandlats. Verifieringen av filinformationen är klar.
CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)...
105503454 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar.
Filsystemet har kontrollerats. Inga problem påträffades.
488383487 kB diskutrymme totalt.
65970016 kB i 165016 filer.
72492 kB i 2569 index.
0 kB i skadade sektorer.
327159 kB används av operativsystemet.
65536 kB hårddisksutrymme används av loggfilen.
422013820 kB ledigt utrymme.
4096 byte i varje allokeringsenhet.
122095871 allokeringsenheter finns totalt på disken.
105503455 allokeringsenheter är tillgängliga på disken.
My System SpecsSystem Spec
06 Feb 2011   #9

Windows 7 Ultimate 32 bit
 
 

I believe it shows 0 bytes in bad clusters or sectors. That is what I was looking for. It looks like it did a little cleaning up of your file system. It looks like your file system is in good shape.
My System SpecsSystem Spec
07 Feb 2011   #10
eim

Windows 7 Ultimate x64
 
 

This aint fun... Today when i booted upp the computer, it didnt work out the way i hoped it to...
1. Aero theme didnt start - ok i can live with that.
2. Computer performance is really bad... slow like a 286 again - what is this now...
3. Explorer.exe crashes, constantly... i cant open anything, APPCRACH. - oh no...
4. System hangs, restart and... BSOD
5. Rebooted the computer, and now it looks allright again....

Latest Logfiles attached - Is there a chance to find the cause?

(i bought this hardware 4 months ago and have spent so much time trying to get it working, after 2 months the reseller gave me a new motherboard... but that did not change a thing. I reinstalled many times, changed harddrives, changed PSU, dont know what to do now... its annoying, for real )

Could it be Windows 7 64-bit that is the problem? (is it worth a try with Windows 7 -32bit?)
My System SpecsSystem Spec
Reply

 BSOD + random crash




Thread Tools



Similar help and support threads for2: BSOD + random crash
Thread Forum
Random BSOD Crash BSOD Help and Support
Random BSOD crash BSOD Help and Support
Random BSOD crash BSOD Help and Support
Random Crash Bsod BSOD Help and Support
Random BSOD Crash BSOD Help and Support
Random crash, BSOD BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 03:31 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33