BSOD Error


  1. Posts : 57
    Windows 7 x64
       #1

    BSOD Error


    Hello,

    So I came back from work after winter break and am all the sudden am having BSOD issues on my work laptop. Nothing has been installed or changed since I left back in January. Have run some diagnostics and automatic repairs and it hasn't crashed long enough to get me this far so it's a start.

    Here is the folder:

    Attachment 302972

    Thanks in advance for the help!
      My Computer


  2. Posts : 15,026
    Windows 10 Home 64Bit
       #2
      My Computer


  3. Posts : 57
    Windows 7 x64
    Thread Starter
       #3

    Did I not post it correctly?
      My Computer


  4. Posts : 15,026
    Windows 10 Home 64Bit
       #4

    Nope. It was the SF diagnostic tool I found in your zip.
      My Computer


  5. Posts : 57
    Windows 7 x64
    Thread Starter
       #5

    Haha wow, sorry that's embarrassing, here you go!

    Attachment 303145
      My Computer


  6. Posts : 15,026
    Windows 10 Home 64Bit
       #6

    Looks fine now. :)
    Straight forward, Symantec.

    Please remove it for testing purpose. Use Microsoft Security Essentials.

    Recommended from a strict BSOD perspective, compatibility & stability compared to other security software:

    Microsoft Security Essentials - Free Antivirus for Windows

    Malwarebytes - Free

    Good and Free system security combination.
    Code:
    Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\USER\Downloads\emfajardo2\SF_24-01-2014\012314-37627-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`03051000 PsLoadedModuleList = 0xfffff800`032946d0
    Debug session time: Fri Jan 24 01:28:30.854 2014 (UTC + 6:00)
    System Uptime: 0 days 0:16:15.947
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8000382107c, 0, fffff88005c90d83, 2}
    
    *** WARNING: Unable to verify timestamp for SRTSPL64.SYS
    *** ERROR: Module load completed but symbols could not be loaded for SRTSPL64.SYS
    
    Could not read faulting driver name
    Probably caused by : SRTSPL64.SYS ( SRTSPL64+27d83 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8000382107c, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88005c90d83, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fe100
    GetUlongFromAddress: unable to read from fffff800032fe1c0
     fffff8000382107c Nonpaged pool
    
    FAULTING_IP: 
    SRTSPL64+27d83
    fffff880`05c90d83 420fb60c08      movzx   ecx,byte ptr [rax+r9]
    
    MM_INTERNAL_CODE:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880031bd480 -- (.trap 0xfffff880031bd480)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88005ce1390 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000050 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88005c90d83 rsp=fffff880031bd610 rbp=0000000000000001
     r8=0000000000000440  r9=ffffff7ffdb3fcec r10=fffff80003581028
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    SRTSPL64+0x27d83:
    fffff880`05c90d83 420fb60c08      movzx   ecx,byte ptr [rax+r9] ds:fffff800`0382107c=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800031435e4 to fffff800030c6bc0
    
    STACK_TEXT:  
    fffff880`031bd318 fffff800`031435e4 : 00000000`00000050 fffff800`0382107c 00000000`00000000 fffff880`031bd480 : nt!KeBugCheckEx
    fffff880`031bd320 fffff800`030c4cee : 00000000`00000000 fffff800`0382107c 00000000`00000000 fffff800`03051000 : nt! ?? ::FNODOBFM::`string'+0x43836
    fffff880`031bd480 fffff880`05c90d83 : fffff800`03051000 00000000`00000001 ffffffff`00000040 fffff800`030c2410 : nt!KiPageFault+0x16e
    fffff880`031bd610 fffff800`03051000 : 00000000`00000001 ffffffff`00000040 fffff800`030c2410 00000000`00000440 : SRTSPL64+0x27d83
    fffff880`031bd618 00000000`00000001 : ffffffff`00000040 fffff800`030c2410 00000000`00000440 00000000`00000086 : nt!KiSelectNextThread <PERF> (nt+0x0)
    fffff880`031bd620 ffffffff`00000040 : fffff800`030c2410 00000000`00000440 00000000`00000086 ffffffff`80000500 : 0x1
    fffff880`031bd628 fffff800`030c240f : 00000000`00000440 00000000`00000086 ffffffff`80000500 fffff8a0`04e3f8c0 : 0xffffffff`00000040
    fffff880`031bd630 00000000`00000440 : 00000000`00000086 ffffffff`80000500 fffff8a0`04e3f8c0 fffff8a0`04ea0ab0 : nt!KiIdleLoop+0x15f
    fffff880`031bd638 00000000`00000086 : ffffffff`80000500 fffff8a0`04e3f8c0 fffff8a0`04ea0ab0 fffff880`05c92f49 : 0x440
    fffff880`031bd640 ffffffff`80000500 : fffff8a0`04e3f8c0 fffff8a0`04ea0ab0 fffff880`05c92f49 00000000`00000001 : 0x86
    fffff880`031bd648 fffff8a0`04e3f8c0 : fffff8a0`04ea0ab0 fffff880`05c92f49 00000000`00000001 00000000`00000001 : 0xffffffff`80000500
    fffff880`031bd650 fffff8a0`04ea0ab0 : fffff880`05c92f49 00000000`00000001 00000000`00000001 00000000`00000842 : 0xfffff8a0`04e3f8c0
    fffff880`031bd658 fffff880`05c92f49 : 00000000`00000001 00000000`00000001 00000000`00000842 fffffa80`00000000 : 0xfffff8a0`04ea0ab0
    fffff880`031bd660 00000000`00000001 : 00000000`00000001 00000000`00000842 fffffa80`00000000 00000006`00000001 : SRTSPL64+0x29f49
    fffff880`031bd668 00000000`00000001 : 00000000`00000842 fffffa80`00000000 00000006`00000001 00000000`00000001 : 0x1
    fffff880`031bd670 00000000`00000842 : fffffa80`00000000 00000006`00000001 00000000`00000001 fffff8a0`000000d6 : 0x1
    fffff880`031bd678 fffffa80`00000000 : 00000006`00000001 00000000`00000001 fffff8a0`000000d6 00000000`00000000 : 0x842
    fffff880`031bd680 00000006`00000001 : 00000000`00000001 fffff8a0`000000d6 00000000`00000000 00000000`00000000 : 0xfffffa80`00000000
    fffff880`031bd688 00000000`00000001 : fffff8a0`000000d6 00000000`00000000 00000000`00000000 fffff800`03051000 : 0x00000006`00000001
    fffff880`031bd690 fffff8a0`000000d6 : 00000000`00000000 00000000`00000000 fffff800`03051000 08004000`005e5000 : 0x1
    fffff880`031bd698 00000000`00000000 : 00000000`00000000 fffff800`03051000 08004000`005e5000 00150081`00000000 : 0xfffff8a0`000000d6
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    SRTSPL64+27d83
    fffff880`05c90d83 420fb60c08      movzx   ecx,byte ptr [rax+r9]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  SRTSPL64+27d83
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: SRTSPL64
    
    IMAGE_NAME:  SRTSPL64.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a80e58a
    
    FAILURE_BUCKET_ID:  X64_0x50_SRTSPL64+27d83
    
    BUCKET_ID:  X64_0x50_SRTSPL64+27d83
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm SRTSPL64
    start             end                 module name
    fffff880`05c69000 fffff880`05ceb000   SRTSPL64 T (no symbols)           
        Loaded symbol image file: SRTSPL64.SYS
        Image path: \SystemRoot\System32\Drivers\SRTSPL64.SYS
        Image name: SRTSPL64.SYS
        Timestamp:        Tue Aug 11 09:29:14 2009 (4A80E58A)
        CheckSum:         00078723
        ImageSize:        00082000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Then complete these steps:
    Run a System file check (SFC): SFC /SCANNOW Command - System File Checker

    Scan with Kaspersky TDSSKiller:Anti-rootkit utility TDSSKiller

    ESET online scanner: Free Online Virus Scanner | ESET

    Run Disk Check on your Hard Drive(s): Disk Check
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:05.
Find Us