New
#11
malwarebytes didn't find this as malware. should i manually remove it?
malwarebytes didn't find this as malware. should i manually remove it?
Download,install,update SUPERAntiSpyware.com - Downloading File
Then run a full scan.
Finish and post back.
here it is
Run Memtest for at least 7 passes.
A memory problem is the most probable cause.
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a000949610, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff88001325b39, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004d14100 fffff8a000949610 FAULTING_IP: Ntfs!NtfsGetCachedLengthInsertionPoint+75 fffff880`01325b39 420fb70c40 movzx ecx,word ptr [rax+r8*2] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: System CURRENT_IRQL: 0 TRAP_FRAME: fffff88004985080 -- (.trap 0xfffff88004985080) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a000933000 rbx=0000000000000000 rcx=fffff8800498521d rdx=00000000000007bb rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001325b39 rsp=fffff88004985210 rbp=000000000693fa0d r8=000000000000b308 r9=fffff8a000956000 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc Ntfs!NtfsGetCachedLengthInsertionPoint+0x75: fffff880`01325b39 420fb70c40 movzx ecx,word ptr [rax+r8*2] ds:0001:fffff8a0`00949610=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80004a8d9fc to fffff80004ae1c40 STACK_TEXT: fffff880`04984f18 fffff800`04a8d9fc : 00000000`00000050 fffff8a0`00949610 00000000`00000000 fffff880`04985080 : nt!KeBugCheckEx fffff880`04984f20 fffff800`04adfd6e : 00000000`00000000 fffff8a0`00949610 00000000`00000000 fffffa80`0ab2b308 : nt! ?? ::FNODOBFM::`string'+0x4611f fffff880`04985080 fffff880`01325b39 : fffffa80`0ab2b308 0007bb00`0693fa0d 00000000`00000003 00000000`00000c00 : nt!KiPageFault+0x16e fffff880`04985210 fffff880`013249c2 : fffffa80`0ab2b308 00000000`0693fa0d fffffa80`0ab2b308 00000000`000007bb : Ntfs!NtfsGetCachedLengthInsertionPoint+0x75 fffff880`04985270 fffff880`01324698 : 00000000`00000000 fffff8a0`00968018 fffffa80`0ab2b308 00000000`00000c00 : Ntfs!NtfsInsertCachedRun+0x32 fffff880`049852d0 fffff880`01326a20 : fffffa80`0ab2a180 00000000`0693fa0d fffffa80`0a7f5000 fffffa80`0a7f5000 : Ntfs!NtfsInsertCachedLcn+0x120 fffff880`04985370 fffff880`0132922f : 00000000`00000006 00000000`06938000 00000000`06938000 00000000`c0000000 : Ntfs!NtfsAddCachedRun+0x60 fffff880`049853b0 fffff880`01328ac2 : 00000000`06938000 fffff800`04c82260 fffffa80`0ab2a180 fffffa80`0a7f5010 : Ntfs!NtfsAddCachedRunMult+0x4f fffff880`049853f0 fffff880`0132c2f0 : fffffa80`0a7f5010 fffffa80`0ab2a180 fffffa80`00000000 00000000`06938000 : Ntfs!NtfsScanEntireBitmap+0x18e fffff880`049856e0 fffff880`0133e130 : fffffa80`0a7f5010 fffffa80`0ab2a180 00000000`00000000 00000000`00000000 : Ntfs!NtfsInitializeClusterAllocation+0x60 fffff880`04985710 fffff880`012d980d : 00000000`00000000 fffffa80`0ab1c2b0 00000000`00000001 00000000`00000000 : Ntfs!NtfsMountVolume+0x13c8 fffff880`04985a50 fffff880`01260985 : 00000000`00000000 00000000`00000000 fffffa80`0a7f5010 fffff800`04ae9f93 : Ntfs!NtfsCommonFileSystemControl+0x59 fffff880`04985a90 fffff800`04aec001 : fffff800`04c82200 fffff800`04dd8900 fffffa80`09dff000 00000000`00000001 : Ntfs!NtfsFspDispatch+0x2ad fffff880`04985b70 fffff800`04d7cfee : 00000000`00000000 fffffa80`09dff040 00000000`00000080 fffffa80`09d59040 : nt!ExpWorkerThread+0x111 fffff880`04985c00 fffff800`04ad35e6 : fffff880`04765180 fffffa80`09dff040 fffff880`0476ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a fffff880`04985c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: Ntfs!NtfsGetCachedLengthInsertionPoint+75 fffff880`01325b39 420fb70c40 movzx ecx,word ptr [rax+r8*2] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: Ntfs!NtfsGetCachedLengthInsertionPoint+75 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d79997b FAILURE_BUCKET_ID: X64_0x50_Ntfs!NtfsGetCachedLengthInsertionPoint+75 BUCKET_ID: X64_0x50_Ntfs!NtfsGetCachedLengthInsertionPoint+75 Followup: MachineOwner ---------
I am unsure if anyone has mentioned this but better safe than sorry.
Using MagicISO to create ISO image filesPlease remove any CD visualization programs such as Daemon Tools and Alcohol 120%.
They use a driver, found in your dmp, called sptd.sys, that is notorious for causing BSODs.
Use this SPTD uninstaller DuplexSecure - Downloads DuplexSecure - FAQ
when you're done you can use this Freeware:
MagicISO Virtual CD/DVD-ROM (MagicDisc) in its place
ran memtest 10 straight passes no errors. it took about 18 hours.
as for daemon tools, thanks didn't know that and i do have it installed. i'll clean that out at once.
how do i use the uninstaller? i just bsod'd again but haven't removed the driver yet
ok thanks i just uninstalled it and restarted will post back if i get another bsod.