BSOD if copying


  1. Posts : 6
    Windows 7 Enterprise x86
       #1

    BSOD if copying


    Original OS: FreeDos
    Now: Windows 7 Enterprise 64bit, full retail
    cca 6 months old (from March)
    installed four times

    Attachment 173736

    (Samsung M2 triggered the problem, too)
      My Computer


  2. Posts : 968
    Windows 7 Ultimate x64
       #2

    A few things I'm looking at is memory corruption that was stated in a couple of the minidumps please run Memtest86 as this tutorial suggests:
    RAM - Test with Memtest86+

    Also I couldn't find what anti-virus you were using but the main issue that I see is with the vbfilter.sys driver.

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Administrator\Downloads\Windows_NT6_BSOD_jcgriff2\090111-16473-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*F:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e45670
    Debug session time: Thu Sep  1 06:29:27.889 2011 (UTC - 6:00)
    System Uptime: 0 days 0:22:30.356
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff8800132fc08, 2, 8, fffff8800132fc08}
    
    Unable to load image VBFilter.Sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for VBFilter.Sys
    *** ERROR: Module load completed but symbols could not be loaded for VBFilter.Sys
    Probably caused by : VBFilter.Sys ( VBFilter+1862 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8800132fc08, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: fffff8800132fc08, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaf100
     fffff8800132fc08 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    Ntfs! ?? ::NNGAKEGL::`string'+2bf0
    fffff880`0132fc08 55              push    rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  TOTALCMD.EXE
    
    TRAP_FRAME:  fffff8800983f170 -- (.trap 0xfffff8800983f170)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fc0284f3e4b31b96 rbx=0000000000000000 rcx=fffffa8000000008
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002cca711 rsp=fffff8800983f300 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=0000058000000000
    r11=fffff8800983f350 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz ac po cy
    nt!MiRemoveLowestPriorityStandbyPage+0x139:
    fffff800`02cca711 4c8934c1        mov     qword ptr [rcx+rax*8],r14 ds:e014221f`2598dcb8=????????????????
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff8800983f0c8 -- (.exr 0xfffff8800983f0c8)
    ExceptionAddress: fffff80002cca711 (nt!MiRemoveLowestPriorityStandbyPage+0x0000000000000139)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    LAST_CONTROL_TRANSFER:  from fffff80002c7c1e9 to fffff80002c7cc40
    
    FAILED_INSTRUCTION_ADDRESS: 
    Ntfs! ?? ::NNGAKEGL::`string'+2bf0
    fffff880`0132fc08 55              push    rbp
    
    STACK_TEXT:  
    fffff880`0983de88 fffff800`02c7c1e9 : 00000000`0000000a fffff880`0132fc08 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    fffff880`0983de90 fffff800`02c7ae60 : 00000000`00000000 00000000`00000000 fffffa80`03eeb1a0 fffff880`01290840 : nt!KiBugCheckDispatch+0x69
    fffff880`0983dfd0 fffff880`0132fc08 : fffff800`02ca8a7c 00000000`00000000 fffffa80`09c9ca90 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`0983e168 fffff800`02ca8a7c : 00000000`00000000 fffffa80`09c9ca90 00000000`00000000 00000000`00000002 : Ntfs! ?? ::NNGAKEGL::`string'+0x2bf0
    fffff880`0983e170 fffff800`02ca84fd : fffff880`01290834 fffff880`0983f6f0 00000000`00000000 fffff880`01240000 : nt!_C_specific_handler+0x8c
    fffff880`0983e1e0 fffff800`02ca72d5 : fffff880`01290834 fffff880`0983e258 fffff880`0983f0c8 fffff880`01240000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`0983e210 fffff800`02cb8361 : fffff880`0983f0c8 fffff880`0983e920 fffff880`00000000 fffff800`02eb2d08 : nt!RtlDispatchException+0x415
    fffff880`0983e8f0 fffff800`02c7c2c2 : fffff880`0983f0c8 fffffa80`00c60360 fffff880`0983f170 fffff800`02eb2d28 : nt!KiDispatchException+0x135
    fffff880`0983ef90 fffff800`02c7abca : fffffa80`04f06000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`0983f170 fffff800`02cca711 : 00000580`00000000 fffff800`02c8cbfc fffffa80`00c5fe20 fffffa80`00c5fe20 : nt!KiGeneralProtectionFault+0x10a
    fffff880`0983f300 fffff800`02ca99bc : 00000000`00000000 00000000`00000000 fffff880`0983f3c0 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x139
    fffff880`0983f380 fffff800`02ca5e3e : fffff980`017f7000 00000000`04d97020 fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0xe50
    fffff880`0983f570 fffff800`02ca63f4 : fffffa80`044b0d00 00000000`04d97020 fffff880`0983f6b0 fffff880`00000000 : nt!CcMapAndCopyInToCache+0x20e
    fffff880`0983f660 fffff880`012dcc18 : 00000001`a2980000 fffffa80`05435600 fffff880`0983f750 fffffa80`054356a0 : nt!CcCopyWrite+0x194
    fffff880`0983f6f0 fffff880`0106c102 : fffffa80`054356a0 fffff880`0106f4f2 fffff880`00010000 00000000`00010001 : Ntfs!NtfsCopyWriteA+0x208
    fffff880`0983f8f0 fffff880`0106f8ba : fffff880`0983f9c0 fffffa80`0449d4e8 00000000`04d90000 00000000`00010000 : fltmgr!FltpPerformFastIoCall+0xf2
    fffff880`0983f950 fffff880`0108d83e : 00000000`00010000 00000000`00000000 fffffa80`054356a0 fffff880`0983fb40 : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`0983f990 fffff880`018d6862 : 00000000`00000001 fffffa80`0b157040 fffffa80`04987270 fffffa80`04987270 : fltmgr!FltpFastIoWrite+0x1ce
    fffff880`0983fa30 00000000`00000001 : fffffa80`0b157040 fffffa80`04987270 fffffa80`04987270 00000000`00000000 : VBFilter+0x1862
    fffff880`0983fa38 fffffa80`0b157040 : fffffa80`04987270 fffffa80`04987270 00000000`00000000 00000000`04d90020 : 0x1
    fffff880`0983fa40 fffffa80`04987270 : fffffa80`04987270 00000000`00000000 00000000`04d90020 fffff880`0983fb40 : 0xfffffa80`0b157040
    fffff880`0983fa48 fffffa80`04987270 : 00000000`00000000 00000000`04d90020 fffff880`0983fb40 fffffa80`05e4cde0 : 0xfffffa80`04987270
    fffff880`0983fa50 00000000`00000000 : 00000000`04d90020 fffff880`0983fb40 fffffa80`05e4cde0 fffffa80`0951ee10 : 0xfffffa80`04987270
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    VBFilter+1862
    fffff880`018d6862 ??              ???
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  VBFilter+1862
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: VBFilter
    
    IMAGE_NAME:  VBFilter.Sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e007c29
    
    FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_VBFilter+1862
    
    BUCKET_ID:  X64_0xD1_CODE_AV_BAD_IP_VBFilter+1862
    
    Followup: MachineOwner
    So uninstall you anti-virus and install MSE: Virus, Spyware & Malware Protection | Microsoft Security Essentials

    Then uninstall daemon tools this is a major cause for bsods and install magic disc:
    Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview

    To remove SPTD.sys:

    Download the SPTD standalone installer from Duplex Secure.
    Execute and choose to uninstall.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 13:24.
Find Us