Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD - Frequently Happens - (The bugcheck was: 0x0000001d)

29 Mar 2015   #1
tetsato

Windows 7 Home Premium 32 bit
 
 
BSOD - Frequently Happens - (The bugcheck was: 0x0000001d)

Hi,

My computer started to reboot unexpectedly.
I am not sure what the cause is because I haven't made any change since it started to having this.
The bug check was 0x0000001d, but sometimes 0x0000001e.

Any help is appreciated.

Regards,

Tets


My System SpecsSystem Spec
.
31 Mar 2015   #2
Arc

Microsoft Community Contributor Award Recipient

Microsoft Windows 10 Pro Insider Preview 64-bit
 
 

Please upload your MSINFO32.nfo file.
  1. Click on the start button
  2. Type "msinfo32" (without quotes) in the search bar of the start menu, click the resulting link. It will open the System Information window.
  3. File>Save. In the "File Name" filed, put "MSINFO32" (without Quote), give the save location to desktop, and click the "save" button.
  4. Give the time for processing, it will save a .nfo file on your desktop.
  5. Zip it, and upload it following the instruction.
We need to see it before we suggest anything.
_________________________________________________
Code:
BugCheck D1, {fffffa8015400000, 2, 0, fffff880065085b7}

*** WARNING: Unable to verify timestamp for NWTransLib.sys
*** ERROR: Module load completed but symbols could not be loaded for NWTransLib.sys
*** WARNING: Unable to verify timestamp for NW1950.sys
*** ERROR: Module load completed but symbols could not be loaded for NW1950.sys
Probably caused by : NWTransLib.sys ( NWTransLib+b5b7 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8015400000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880065085b7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec6100
GetUlongFromAddress: unable to read from fffff80002ec61c0
 fffffa8015400000 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
NWTransLib+b5b7
fffff880`065085b7 803c175b        cmp     byte ptr [rdi+rdx],5Bh

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  svchost.exe

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

DPC_STACK_BASE:  FFFFF88002F93FB0

TRAP_FRAME:  fffff88002f93860 -- (.trap 0xfffff88002f93860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000d41ff68 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8007fe00a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880065085b7 rsp=fffff88002f939f0 rbp=0000000000000000
 r8=00000000fffff1de  r9=fffff8800651de70 r10=fffff8800651de70
r11=fffff88002f93af8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
NWTransLib+0xb5b7:
fffff880`065085b7 803c175b        cmp     byte ptr [rdi+rdx],5Bh ds:fffffa80`07fe00a0=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c8c469 to fffff80002c8cec0

STACK_TEXT:  
fffff880`02f93718 fffff800`02c8c469 : 00000000`0000000a fffffa80`15400000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f93720 fffff800`02c8b0e0 : 00000000`0000000f fffff880`02f938e0 00000000`0d2159df 00000000`0000000f : nt!KiBugCheckDispatch+0x69
fffff880`02f93860 fffff880`065085b7 : fffffa80`086a19f0 fffffa80`0734f6a0 fffffa80`086a1d88 fffff880`0400baf8 : nt!KiPageFault+0x260
fffff880`02f939f0 fffffa80`086a19f0 : fffffa80`0734f6a0 fffffa80`086a1d88 fffff880`0400baf8 00000000`00000000 : NWTransLib+0xb5b7
fffff880`02f939f8 fffffa80`0734f6a0 : fffffa80`086a1d88 fffff880`0400baf8 00000000`00000000 fffffa80`07fdb020 : 0xfffffa80`086a19f0
fffff880`02f93a00 fffffa80`086a1d88 : fffff880`0400baf8 00000000`00000000 fffffa80`07fdb020 00000000`00000000 : 0xfffffa80`0734f6a0
fffff880`02f93a08 fffff880`0400baf8 : 00000000`00000000 fffffa80`07fdb020 00000000`00000000 00000000`00000000 : 0xfffffa80`086a1d88
fffff880`02f93a10 fffff880`057c224e : 00000000`fffff1de fffffa80`07fe00a0 fffff880`00d91730 00000000`0000033b : usbohci!OHCI_SubmitTransfer+0x80
fffff880`02f93a50 00000000`fffff1de : fffffa80`07fe00a0 fffff880`00d91730 00000000`0000033b fffffa80`07fde9f0 : NW1950+0x324e
fffff880`02f93a58 fffffa80`07fe00a0 : fffff880`00d91730 00000000`0000033b fffffa80`07fde9f0 fffff880`00d548e0 : 0xfffff1de
fffff880`02f93a60 fffff880`00d91730 : 00000000`0000033b fffffa80`07fde9f0 fffff880`00d548e0 00000000`00000000 : 0xfffffa80`07fe00a0
fffff880`02f93a68 00000000`0000033b : fffffa80`07fde9f0 fffff880`00d548e0 00000000`00000000 00000000`00000000 : Wdf01000!WPP_ThisDir_CTLGUID_KmdfTraceGuid+0x620
fffff880`02f93a70 fffffa80`07fde9f0 : fffff880`00d548e0 00000000`00000000 00000000`00000000 00000000`00000000 : 0x33b
fffff880`02f93a78 fffff880`00d548e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000007 : 0xfffffa80`07fde9f0
fffff880`02f93a80 fffff880`00d01c6c : fffffa80`07fdf9a0 00000000`00000000 fffffa80`08646c58 fffff880`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x64
fffff880`02f93b00 fffff880`00d02950 : fffffa80`07fdea00 fffffa80`07fde9f0 00000000`00000001 fffffa80`07fdea00 : Wdf01000!FxRequestBase::CompleteSubmitted+0x170
fffff880`02f93b80 fffff880`00d01e2c : 00000000`00000002 fffffa80`0785c988 00000000`00000000 fffffa80`0734e050 : Wdf01000!FxIoTarget::RequestCompletionRoutine+0x1c0
fffff880`02f93bf0 fffff800`02c79755 : fffffa80`07862180 fffffa80`0785c910 fffffa80`0751f370 fffffa80`0751f300 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x3c
fffff880`02f93c20 fffff800`02c901e1 : fffffa80`07fdf933 00000000`00000000 00000000`00000000 00000000`00000050 : nt!IopUnloadSafeCompletion+0x55
fffff880`02f93c60 fffff880`04025631 : fffffa80`0734e050 fffffa80`07fda200 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`02f93d50 fffff880`04025b0f : fffffa80`08666a02 fffffa80`07fdf590 00000000`ffffffff fffffa80`0734eeb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f93e30 fffff880`0402366f : fffffa80`0734eeb0 fffffa80`0734e1a0 fffffa80`0734f050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f93e90 fffff880`04014f89 : fffffa80`0734e050 00000000`00000000 fffffa80`0734ee02 fffffa80`0734eeb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f93ed0 fffff800`02c987ac : fffff880`02f64180 fffffa80`0734eeb0 fffffa80`0734eec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f93f00 fffff800`02c8f925 : 00041240`717861c0 fffffa80`08326060 00000000`00000000 fffff880`04014db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f93fb0 fffff800`02c8f73c : fffffa80`066c9cc0 00000000`00000000 fffff8a0`01a24101 fffff8a0`00001a60 : nt!KxRetireDpcList+0x5
fffff880`02a32cd0 fffff800`02cd8ad3 : fffff800`02c88903 fffff800`02c8896f 00000000`00000c74 00000000`00000c74 : nt!KiDispatchInterruptContinue
fffff880`02a32d00 fffff800`02c8896f : 00000000`00000c74 00000000`00000c74 00000000`00000000 fffff8a0`0194b060 : nt!KiDpcInterruptBypass+0x13
fffff880`02a32d10 fffff800`02dc21b5 : 00000000`00000000 00000000`00100001 00000000`00000900 00000000`00000000 : nt!KiChainedDispatch+0x19f
fffff880`02a32ea0 fffff800`02c59246 : fffff8a0`002a0570 fffffa80`087fbae0 00000000`00000000 fffffa80`07bf9668 : nt!ExAllocatePoolWithTag+0xc5
fffff880`02a32f90 fffff880`010377b7 : 00000000`00000000 00000000`00000000 fffffa80`06e38de0 fffffa80`071c6798 : nt!FsRtlInsertPerFileObjectContext+0x6a
fffff880`02a32fd0 fffff880`010381d6 : fffffa80`00000060 fffffa80`071c6798 fffffa80`07467160 00000000`00000000 : fltmgr!TargetedIOCtrlAttachAsFoCtx+0x107
fffff880`02a33020 fffff880`01037be9 : fffffa80`071c6798 00000000`00000000 00000000`00000017 fffff880`01038fe0 : fltmgr!FltpNormalizeNameFromCache+0x1e6
fffff880`02a33140 fffff880`01038f81 : fffffa80`00000038 00000000`00000038 00000000`00000029 00000000`00000000 : fltmgr!FltpExpandShortNames+0x239
fffff880`02a331a0 fffff880`01038e1e : fffffa80`07467160 fffff880`01030000 00000000`00000000 00000000`00000000 : fltmgr!FltpGetNormalizedFileNameWorker+0xc1
fffff880`02a331e0 fffff880`0101a4fb : fffffa80`066d2080 00000000`00000000 fffffa80`087fbd30 fffff880`02a34000 : fltmgr!FltpCreateFileNameInformation+0xee
fffff880`02a33240 fffff880`01025b44 : 00000000`00008000 fffffa80`087fbd30 00000000`00000000 00000000`00000401 : fltmgr!FltpGetFileNameInformation+0x26b
fffff880`02a332c0 fffff880`0106936b : fffffa80`07467160 fffff8a0`0204cc90 00000000`00000001 fffff880`02a333f0 : fltmgr!FltGetFileNameInformation+0x184
fffff880`02a33350 fffff880`01067bdb : fffff140`00540b47 00000000`00000001 00000000`00000000 00000000`00000899 : fileinfo!FIStreamGetInfo+0x11f
fffff880`02a333d0 fffff880`01018288 : 00000000`00000000 fffff8a0`0204cc90 fffffa80`0880cfb8 00000000`00000000 : fileinfo!FIPostCreateCallback+0x1c7
fffff880`02a33460 fffff880`01016d1b : fffffa80`071b2030 fffffa80`0880c9d0 fffffa80`071e93e0 fffffa80`071e9600 : fltmgr!FltpPerformPostCallbacks+0x368
fffff880`02a33530 fffff880`010362b9 : fffffa80`0880cc60 fffffa80`07bf9010 fffffa80`0880cc00 fffffa80`06e38de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x39b
fffff880`02a335c0 fffff800`02f8edbc : 00000000`00000045 fffffa80`08671c28 fffffa80`0869dc00 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`02a33670 fffff800`02f8a738 : fffffa80`06e03060 fffff800`00000000 fffffa80`08671a70 fffff800`00000001 : nt!IopParseDevice+0x14d3
fffff880`02a337d0 fffff800`02f8b956 : 00000000`00000000 fffffa80`08671a70 fffff8a0`0204b540 fffffa80`0672f9f0 : nt!ObpLookupObjectName+0x588
fffff880`02a338c0 fffff800`02f6a816 : fffff8a0`0204b510 00000000`010de990 00000000`00000001 00000000`00000002 : nt!ObOpenObjectByName+0x306
fffff880`02a33990 fffff800`02c8c153 : fffffa80`08326060 fffff880`02a33ca0 fffffa80`08326060 00000000`00000001 : nt!NtQueryAttributesFile+0x145
fffff880`02a33c20 00000000`77bd168a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`010de958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bd168a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NWTransLib+b5b7
fffff880`065085b7 803c175b        cmp     byte ptr [rdi+rdx],5Bh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NWTransLib+b5b7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NWTransLib

IMAGE_NAME:  NWTransLib.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ab15f09

FAILURE_BUCKET_ID:  X64_0xD1_NWTransLib+b5b7

BUCKET_ID:  X64_0xD1_NWTransLib+b5b7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_nwtranslib+b5b7

FAILURE_ID_HASH:  {a526a6f1-a357-d266-bb0d-cb8325ceef4d}

Followup: MachineOwner
---------

2: kd> lmvm NWTransLib
start             end                 module name
fffff880`064fd000 fffff880`06d6c000   NWTransLib T (no symbols)           
    Loaded symbol image file: NWTransLib.sys
    Image path: NWTransLib.sys
    Image name: NWTransLib.sys
    Timestamp:        Thu Sep 17 03:26:25 2009 (4AB15F09)
    CheckSum:         0002ED9F
    ImageSize:        0086F000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
2: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.6, DMIVersion 0, Size=1305]
BiosMajorRelease = 8
BiosMinorRelease = 15
BiosVendor = American Megatrends Inc.
BiosVersion = 6.02   
BiosReleaseDate = 03/22/2010
SystemManufacturer = Hewlett-Packard
SystemProductName = 300-1205z
SystemFamily = 103C_53316J G=D
SystemVersion = 1.04
SystemSKU = WS329AV#ABA
BaseBoardManufacturer = PEGATRON CORPORATION
BaseBoardProduct = 2A8E
BaseBoardVersion = 1.04
My System SpecsSystem Spec
01 Apr 2015   #3
tetsato

Windows 7 Home Premium 32 bit
 
 

Thanks for the help.
I have uploaded the msinfo32 output.

Regards,

Tets
My System SpecsSystem Spec
.

01 Apr 2015   #4
Arc

Microsoft Community Contributor Award Recipient

Microsoft Windows 10 Pro Insider Preview 64-bit
 
 

It is NextWindow 1950 Touch Screen (c:\windows\system32\drivers\nw1950.sys) that is causing the issue.
Code:
BugCheck D1, {fffffa8015400000, 2, 0, fffff880065085b7}

*** WARNING: Unable to verify timestamp for NWTransLib.sys
*** ERROR: Module load completed but symbols could not be loaded for NWTransLib.sys
*** WARNING: Unable to verify timestamp for NW1950.sys
*** ERROR: Module load completed but symbols could not be loaded for NW1950.sys
Probably caused by : NWTransLib.sys ( NWTransLib+b5b7 )

Followup: MachineOwner
---------
And the driver is too old.
Code:
    Image name: NWTransLib.sys
    Timestamp:        Thu Sep 17 03:26:25 2009
Search for any possible update in http://www.nextwindow.com/?f and apply if available.

Also, you have 27 items in startup. It is obvious that the computer will not run stable. Free up the startup. Windows does not need any other program to auto start with it, but the auto start programs often conflicts and causes various problems including BSODs.
  1. Click on the Start button
  2. Type “msconfig (without quotes), click the resulting link. It will open the System Configuration window.
  3. Select the “Startup” tab.
  4. Deselect all items other than the antivirus.
  5. Apply > OK
  6. Accept then restart.
All them are installed in your computer. Claa them from Start > All programs when needed.

Let us know for any further BSOD after doing these two.
My System SpecsSystem Spec
Reply

 BSOD - Frequently Happens - (The bugcheck was: 0x0000001d)




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
BSODs frequently Bugcheck code: 0x9F
My laptop crashes with BSOD's.It's been a while and this happens whicle is shutdown or randomly.I had this issue long back and with the help of seven forums i got rid od it by uninstalling some usb drivers.Attaching the crash logs and dumps of 2 frequent BSODs. Appreciate your help! On...
BSOD Help and Support
BSOD on start, Startup Repair: Unknown Bugcheck: Bugcheck 3d
We've been getting a BSOD on one of our computers on startup recently. The exact message the BSOD gives varies but often mentions atapi.sys. Having done extensive research we've come to the conclusion that it could be a rootkit or it could be the fact that we have Daemon Tools installed on the...
BSOD Help and Support
The computer has rebooted from a bugcheck. The bugcheck was: 0x000000
I'm new to this forum and in fact new to forums generally. I just tend to struggle on and spend a lot of time reading other peoples solutions. I hope you can help me with my periodically BSOD and I tend to go back to a good known recovery point. But recently these BSOD have been happening more...
BSOD Help and Support
Unknown Bugcheck : Bugcheck c00002e3 - System is randomly Shutting OFF
T61 4GB Kingston T61 specific Ram 2.5GHz 6459CTO T9300 (965 Chipset) Fresh, Full licensed copy of Win 7 Ultimate loaded onto system, without issues. All device drivers from the Lenovo site have been loaded successfully without incident. Device Manager showing Zero issues.
BSOD Help and Support
[BSOD] Bugcheck 101; what is it?
- Windows 7 x64 bit; - the original installed OS on the system: windows 7 professional 64 bit; - full retail version; - the age of system (hardware) one year; - the age of OS installation: seven months after last installation. This is my first time I get the bugcheck 101; I wonder why. ...
BSOD Help and Support
The computer has rebooted from a bugcheck. The bugcheck was: 0x000000
Help me!... I dont know why this started to happen but happens somewhere between twice and three times per day. I attached my Memory.DMP file which is where it said the error was logged. To be specific this was my error. The computer has rebooted from a bugcheck. The bugcheck was:...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 01:10.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App