New
#1
BSOD if copying
Original OS: FreeDos
Now: Windows 7 Enterprise 64bit, full retail
cca 6 months old (from March)
installed four times
Attachment 173736
(Samsung M2 triggered the problem, too)
Original OS: FreeDos
Now: Windows 7 Enterprise 64bit, full retail
cca 6 months old (from March)
installed four times
Attachment 173736
(Samsung M2 triggered the problem, too)
A few things I'm looking at is memory corruption that was stated in a couple of the minidumps please run Memtest86 as this tutorial suggests:
RAM - Test with Memtest86+
Also I couldn't find what anti-virus you were using but the main issue that I see is with the vbfilter.sys driver.
So uninstall you anti-virus and install MSE: Virus, Spyware & Malware Protection | Microsoft Security EssentialsCode:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Administrator\Downloads\Windows_NT6_BSOD_jcgriff2\090111-16473-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*F:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e45670 Debug session time: Thu Sep 1 06:29:27.889 2011 (UTC - 6:00) System Uptime: 0 days 0:22:30.356 Loading Kernel Symbols ............................................................... ................................................................ ..................................................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {fffff8800132fc08, 2, 8, fffff8800132fc08} Unable to load image VBFilter.Sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for VBFilter.Sys *** ERROR: Module load completed but symbols could not be loaded for VBFilter.Sys Probably caused by : VBFilter.Sys ( VBFilter+1862 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff8800132fc08, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: fffff8800132fc08, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaf100 fffff8800132fc08 CURRENT_IRQL: 2 FAULTING_IP: Ntfs! ?? ::NNGAKEGL::`string'+2bf0 fffff880`0132fc08 55 push rbp CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: TOTALCMD.EXE TRAP_FRAME: fffff8800983f170 -- (.trap 0xfffff8800983f170) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fc0284f3e4b31b96 rbx=0000000000000000 rcx=fffffa8000000008 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002cca711 rsp=fffff8800983f300 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000058000000000 r11=fffff8800983f350 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy nt!MiRemoveLowestPriorityStandbyPage+0x139: fffff800`02cca711 4c8934c1 mov qword ptr [rcx+rax*8],r14 ds:e014221f`2598dcb8=???????????????? Resetting default scope EXCEPTION_RECORD: fffff8800983f0c8 -- (.exr 0xfffff8800983f0c8) ExceptionAddress: fffff80002cca711 (nt!MiRemoveLowestPriorityStandbyPage+0x0000000000000139) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff LAST_CONTROL_TRANSFER: from fffff80002c7c1e9 to fffff80002c7cc40 FAILED_INSTRUCTION_ADDRESS: Ntfs! ?? ::NNGAKEGL::`string'+2bf0 fffff880`0132fc08 55 push rbp STACK_TEXT: fffff880`0983de88 fffff800`02c7c1e9 : 00000000`0000000a fffff880`0132fc08 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx fffff880`0983de90 fffff800`02c7ae60 : 00000000`00000000 00000000`00000000 fffffa80`03eeb1a0 fffff880`01290840 : nt!KiBugCheckDispatch+0x69 fffff880`0983dfd0 fffff880`0132fc08 : fffff800`02ca8a7c 00000000`00000000 fffffa80`09c9ca90 00000000`00000000 : nt!KiPageFault+0x260 fffff880`0983e168 fffff800`02ca8a7c : 00000000`00000000 fffffa80`09c9ca90 00000000`00000000 00000000`00000002 : Ntfs! ?? ::NNGAKEGL::`string'+0x2bf0 fffff880`0983e170 fffff800`02ca84fd : fffff880`01290834 fffff880`0983f6f0 00000000`00000000 fffff880`01240000 : nt!_C_specific_handler+0x8c fffff880`0983e1e0 fffff800`02ca72d5 : fffff880`01290834 fffff880`0983e258 fffff880`0983f0c8 fffff880`01240000 : nt!RtlpExecuteHandlerForException+0xd fffff880`0983e210 fffff800`02cb8361 : fffff880`0983f0c8 fffff880`0983e920 fffff880`00000000 fffff800`02eb2d08 : nt!RtlDispatchException+0x415 fffff880`0983e8f0 fffff800`02c7c2c2 : fffff880`0983f0c8 fffffa80`00c60360 fffff880`0983f170 fffff800`02eb2d28 : nt!KiDispatchException+0x135 fffff880`0983ef90 fffff800`02c7abca : fffffa80`04f06000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`0983f170 fffff800`02cca711 : 00000580`00000000 fffff800`02c8cbfc fffffa80`00c5fe20 fffffa80`00c5fe20 : nt!KiGeneralProtectionFault+0x10a fffff880`0983f300 fffff800`02ca99bc : 00000000`00000000 00000000`00000000 fffff880`0983f3c0 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x139 fffff880`0983f380 fffff800`02ca5e3e : fffff980`017f7000 00000000`04d97020 fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0xe50 fffff880`0983f570 fffff800`02ca63f4 : fffffa80`044b0d00 00000000`04d97020 fffff880`0983f6b0 fffff880`00000000 : nt!CcMapAndCopyInToCache+0x20e fffff880`0983f660 fffff880`012dcc18 : 00000001`a2980000 fffffa80`05435600 fffff880`0983f750 fffffa80`054356a0 : nt!CcCopyWrite+0x194 fffff880`0983f6f0 fffff880`0106c102 : fffffa80`054356a0 fffff880`0106f4f2 fffff880`00010000 00000000`00010001 : Ntfs!NtfsCopyWriteA+0x208 fffff880`0983f8f0 fffff880`0106f8ba : fffff880`0983f9c0 fffffa80`0449d4e8 00000000`04d90000 00000000`00010000 : fltmgr!FltpPerformFastIoCall+0xf2 fffff880`0983f950 fffff880`0108d83e : 00000000`00010000 00000000`00000000 fffffa80`054356a0 fffff880`0983fb40 : fltmgr!FltpPassThroughFastIo+0xda fffff880`0983f990 fffff880`018d6862 : 00000000`00000001 fffffa80`0b157040 fffffa80`04987270 fffffa80`04987270 : fltmgr!FltpFastIoWrite+0x1ce fffff880`0983fa30 00000000`00000001 : fffffa80`0b157040 fffffa80`04987270 fffffa80`04987270 00000000`00000000 : VBFilter+0x1862 fffff880`0983fa38 fffffa80`0b157040 : fffffa80`04987270 fffffa80`04987270 00000000`00000000 00000000`04d90020 : 0x1 fffff880`0983fa40 fffffa80`04987270 : fffffa80`04987270 00000000`00000000 00000000`04d90020 fffff880`0983fb40 : 0xfffffa80`0b157040 fffff880`0983fa48 fffffa80`04987270 : 00000000`00000000 00000000`04d90020 fffff880`0983fb40 fffffa80`05e4cde0 : 0xfffffa80`04987270 fffff880`0983fa50 00000000`00000000 : 00000000`04d90020 fffff880`0983fb40 fffffa80`05e4cde0 fffffa80`0951ee10 : 0xfffffa80`04987270 STACK_COMMAND: kb FOLLOWUP_IP: VBFilter+1862 fffff880`018d6862 ?? ??? SYMBOL_STACK_INDEX: 12 SYMBOL_NAME: VBFilter+1862 FOLLOWUP_NAME: MachineOwner MODULE_NAME: VBFilter IMAGE_NAME: VBFilter.Sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e007c29 FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_VBFilter+1862 BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_VBFilter+1862 Followup: MachineOwner
Then uninstall daemon tools this is a major cause for bsods and install magic disc:
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
To remove SPTD.sys:
Download the SPTD standalone installer from Duplex Secure.
Execute and choose to uninstall.