New
#11
Hello Rooooo,
First we need to uninstall TuneUp Utilities, Sophos Anti-Rootkit.
Then run this Tool http://www.duplexsecure.com/download...t-v175-x86.exe
Go to C:\Windows\System32\Drivers and make sure SPTD.sys
Bugcheck:
Hope this helps,Code:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: f7570048, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 8b8c8fa0, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f6f718 Unable to read MiSystemVaType memory at 82f4f160 f7570048 FAULTING_IP: Ntfs!NtfsDeleteScb+202 8b8c8fa0 897848 mov dword ptr [eax+48h],edi MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: System CURRENT_IRQL: 0 TRAP_FRAME: 8d977ae8 -- (.trap 0xffffffff8d977ae8) ErrCode = 00000002 eax=f7570000 ebx=82f26005 ecx=82e3110e edx=b6563ddc esi=8d977b90 edi=00000000 eip=8b8c8fa0 esp=8d977b5c ebp=8d977b6c iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 Ntfs!NtfsDeleteScb+0x202: 8b8c8fa0 897848 mov dword ptr [eax+48h],edi ds:0023:f7570048=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82e4d638 to 82e8c903 STACK_TEXT: 8d977ad0 82e4d638 00000001 f7570048 00000000 nt!MmAccessFault+0x106 8d977ad0 8b8c8fa0 00000001 f7570048 00000000 nt!KiTrap0E+0xdc 8d977b6c 8b8bfb3b 00000705 b6563cb0 b6563c88 Ntfs!NtfsDeleteScb+0x202 8d977b84 8b82f71e 88304a80 b6563d78 00000000 Ntfs!NtfsRemoveScb+0xc5 8d977ba0 8b8b00d2 88304a80 b6563c88 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62 8d977be4 8b82cbec 88304a80 b6563d78 b6563f20 Ntfs!NtfsTeardownStructures+0x68 8d977c0c 8b8ac55b 88304a80 b6563d78 b6563f20 Ntfs!NtfsDecrementCloseCounts+0xaf 8d977c6c 8b8cb4c3 88304a80 b6563d78 b6563c88 Ntfs!NtfsCommonClose+0x4f2 8d977d00 82e74f3b 00000000 00000000 857e3798 Ntfs!NtfsFspClose+0x118 8d977d50 830156d3 00000000 a614c7e4 00000000 nt!ExpWorkerThread+0x10d 8d977d90 82ec70f9 82e74e2e 00000000 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: Ntfs!NtfsDeleteScb+202 8b8c8fa0 897848 mov dword ptr [eax+48h],edi SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: Ntfs!NtfsDeleteScb+202 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45 FAILURE_BUCKET_ID: 0x50_Ntfs!NtfsDeleteScb+202 BUCKET_ID: 0x50_Ntfs!NtfsDeleteScb+202 Followup: MachineOwner ---------
Captain