BSOD System_Service_Exception error 3b

Page 2 of 3 FirstFirst 123 LastLast

  1. Posts : 18
    Windows 7 Pro x64
    Thread Starter
       #11

    malwarebytes didn't find this as malware. should i manually remove it?
      My Computer


  2. Posts : 5,405
    Windows 7 Ultimate 64bit SP1
       #12

    Download,install,update SUPERAntiSpyware.com - Downloading File

    Then run a full scan.

    Finish and post back.
      My Computer


  3. Posts : 18
    Windows 7 Pro x64
    Thread Starter
       #13

    here it is
      My Computer


  4. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #14

    Run Memtest for at least 7 passes.
    A memory problem is the most probable cause.
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a000949610, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88001325b39, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004d14100
     fffff8a000949610 
    
    FAULTING_IP: 
    Ntfs!NtfsGetCachedLengthInsertionPoint+75
    fffff880`01325b39 420fb70c40      movzx   ecx,word ptr [rax+r8*2]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88004985080 -- (.trap 0xfffff88004985080)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a000933000 rbx=0000000000000000 rcx=fffff8800498521d
    rdx=00000000000007bb rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001325b39 rsp=fffff88004985210 rbp=000000000693fa0d
     r8=000000000000b308  r9=fffff8a000956000 r10=0000000000000001
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    Ntfs!NtfsGetCachedLengthInsertionPoint+0x75:
    fffff880`01325b39 420fb70c40      movzx   ecx,word ptr [rax+r8*2] ds:0001:fffff8a0`00949610=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80004a8d9fc to fffff80004ae1c40
    
    STACK_TEXT:  
    fffff880`04984f18 fffff800`04a8d9fc : 00000000`00000050 fffff8a0`00949610 00000000`00000000 fffff880`04985080 : nt!KeBugCheckEx
    fffff880`04984f20 fffff800`04adfd6e : 00000000`00000000 fffff8a0`00949610 00000000`00000000 fffffa80`0ab2b308 : nt! ?? ::FNODOBFM::`string'+0x4611f
    fffff880`04985080 fffff880`01325b39 : fffffa80`0ab2b308 0007bb00`0693fa0d 00000000`00000003 00000000`00000c00 : nt!KiPageFault+0x16e
    fffff880`04985210 fffff880`013249c2 : fffffa80`0ab2b308 00000000`0693fa0d fffffa80`0ab2b308 00000000`000007bb : Ntfs!NtfsGetCachedLengthInsertionPoint+0x75
    fffff880`04985270 fffff880`01324698 : 00000000`00000000 fffff8a0`00968018 fffffa80`0ab2b308 00000000`00000c00 : Ntfs!NtfsInsertCachedRun+0x32
    fffff880`049852d0 fffff880`01326a20 : fffffa80`0ab2a180 00000000`0693fa0d fffffa80`0a7f5000 fffffa80`0a7f5000 : Ntfs!NtfsInsertCachedLcn+0x120
    fffff880`04985370 fffff880`0132922f : 00000000`00000006 00000000`06938000 00000000`06938000 00000000`c0000000 : Ntfs!NtfsAddCachedRun+0x60
    fffff880`049853b0 fffff880`01328ac2 : 00000000`06938000 fffff800`04c82260 fffffa80`0ab2a180 fffffa80`0a7f5010 : Ntfs!NtfsAddCachedRunMult+0x4f
    fffff880`049853f0 fffff880`0132c2f0 : fffffa80`0a7f5010 fffffa80`0ab2a180 fffffa80`00000000 00000000`06938000 : Ntfs!NtfsScanEntireBitmap+0x18e
    fffff880`049856e0 fffff880`0133e130 : fffffa80`0a7f5010 fffffa80`0ab2a180 00000000`00000000 00000000`00000000 : Ntfs!NtfsInitializeClusterAllocation+0x60
    fffff880`04985710 fffff880`012d980d : 00000000`00000000 fffffa80`0ab1c2b0 00000000`00000001 00000000`00000000 : Ntfs!NtfsMountVolume+0x13c8
    fffff880`04985a50 fffff880`01260985 : 00000000`00000000 00000000`00000000 fffffa80`0a7f5010 fffff800`04ae9f93 : Ntfs!NtfsCommonFileSystemControl+0x59
    fffff880`04985a90 fffff800`04aec001 : fffff800`04c82200 fffff800`04dd8900 fffffa80`09dff000 00000000`00000001 : Ntfs!NtfsFspDispatch+0x2ad
    fffff880`04985b70 fffff800`04d7cfee : 00000000`00000000 fffffa80`09dff040 00000000`00000080 fffffa80`09d59040 : nt!ExpWorkerThread+0x111
    fffff880`04985c00 fffff800`04ad35e6 : fffff880`04765180 fffffa80`09dff040 fffff880`0476ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`04985c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsGetCachedLengthInsertionPoint+75
    fffff880`01325b39 420fb70c40      movzx   ecx,word ptr [rax+r8*2]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Ntfs!NtfsGetCachedLengthInsertionPoint+75
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d79997b
    
    FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsGetCachedLengthInsertionPoint+75
    
    BUCKET_ID:  X64_0x50_Ntfs!NtfsGetCachedLengthInsertionPoint+75
    
    Followup: MachineOwner
    ---------
      My Computer


  5. Posts : 28,845
    Win 8 Release candidate 8400
       #15

    I am unsure if anyone has mentioned this but better safe than sorry.



    Please remove any CD visualization programs such as Daemon Tools and Alcohol 120%.

    They use a driver, found in your dmp, called sptd.sys, that is notorious for causing BSODs.

    Use this SPTD uninstaller DuplexSecure - Downloads DuplexSecure - FAQ

    when you're done you can use this Freeware:

    MagicISO Virtual CD/DVD-ROM (MagicDisc) in its place
    Using MagicISO to create ISO image files
      My Computer


  6. Posts : 18
    Windows 7 Pro x64
    Thread Starter
       #16

    ran memtest 10 straight passes no errors. it took about 18 hours.
    as for daemon tools, thanks didn't know that and i do have it installed. i'll clean that out at once.
      My Computer


  7. Posts : 28,845
    Win 8 Release candidate 8400
       #17

    hushbird123 said:
    ran memtest 10 straight passes no errors. it took about 18 hours.
    as for daemon tools, thanks didn't know that and i do have it installed. i'll clean that out at once.
    Let us know if you need help

    Ken
      My Computer


  8. Posts : 18
    Windows 7 Pro x64
    Thread Starter
       #18

    how do i use the uninstaller? i just bsod'd again but haven't removed the driver yet
      My Computer


  9. Posts : 5,405
    Windows 7 Ultimate 64bit SP1
       #19

    For the daemon tools got to C:\Program Files (x86)\DAEMON Tools Lite,there find and use the uninst.

    For the sptd,just download the SPTD run the program and click uninstall.
      My Computer


  10. Posts : 18
    Windows 7 Pro x64
    Thread Starter
       #20

    ok thanks i just uninstalled it and restarted will post back if i get another bsod.
      My Computer


 
Page 2 of 3 FirstFirst 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:42.
Find Us