Random BSODs with random intervals (have files from SF diagnostics)


  1. Posts : 1
    windows 7 64bit
       #1

    Random BSODs with random intervals (have files from SF diagnostics)


    Getting random BSODS from 5 times a week to 2 times a week to 0 times a week its really random and i hope the files can describe the issue.
      My Computer


  2. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #2

    Hi justicar.

    Uninstall Panda Free Antivirus using the tool supplied here.

    Use Microsoft Security Essentials as your antivirus with windows inbuilt firewall, and free MBAM as the on demand scanner.

    Let us know for any further BSOD.
    ______________________________________
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a0120b202c, 0, fffff88006643be0, 0}
    
    *** WARNING: Unable to verify timestamp for NNSStrm.sys
    *** ERROR: Module load completed but symbols could not be loaded for NNSStrm.sys
    
    Could not read faulting driver name
    Probably caused by : NNSStrm.sys ( NNSStrm+36be0 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a0120b202c, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88006643be0, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003303100
    GetUlongFromAddress: unable to read from fffff800033031c0
     fffff8a0120b202c Paged pool
    
    FAULTING_IP: 
    NNSStrm+36be0
    fffff880`06643be0 488b040a        mov     rax,qword ptr [rdx+rcx]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
    
    TRAP_FRAME:  fffff880009d76e0 -- (.trap 0xfffff880009d76e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000007fffff60000 rbx=0000000000000000 rcx=000007fffff60000
    rdx=fffff0a01215202c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88006643be0 rsp=fffff880009d7878 rbp=fffffa8006ee88e4
     r8=000000000000005a  r9=0000000000000002 r10=fffff880009d7518
    r11=000007fffff60000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    NNSStrm+0x36be0:
    fffff880`06643be0 488b040a        mov     rax,qword ptr [rdx+rcx] ds:fffff8a0`120b202c=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003149bf0 to fffff800030cbbc0
    
    STACK_TEXT:  
    fffff880`009d7578 fffff800`03149bf0 : 00000000`00000050 fffff8a0`120b202c 00000000`00000000 fffff880`009d76e0 : nt!KeBugCheckEx
    fffff880`009d7580 fffff800`030c9cee : 00000000`00000000 fffff8a0`120b202c 00000000`00000000 fffff8a0`0b2eca74 : nt! ?? ::FNODOBFM::`string'+0x4518f
    fffff880`009d76e0 fffff880`06643be0 : fffff880`0662b20d 000007ff`fff60000 fffff8a0`0b2eca74 00800000`00102000 : nt!KiPageFault+0x16e
    fffff880`009d7878 fffff880`0662b20d : 000007ff`fff60000 fffff8a0`0b2eca74 00800000`00102000 00000000`00000000 : NNSStrm+0x36be0
    fffff880`009d7880 000007ff`fff60000 : fffff8a0`0b2eca74 00800000`00102000 00000000`00000000 fffff880`06649148 : NNSStrm+0x1e20d
    fffff880`009d7888 fffff8a0`0b2eca74 : 00800000`00102000 00000000`00000000 fffff880`06649148 fffff880`02f69f40 : 0x000007ff`fff60000
    fffff880`009d7890 00800000`00102000 : 00000000`00000000 fffff880`06649148 fffff880`02f69f40 fffffa80`0837c580 : 0xfffff8a0`0b2eca74
    fffff880`009d7898 00000000`00000000 : fffff880`06649148 fffff880`02f69f40 fffffa80`0837c580 fffff880`009d7930 : 0x00800000`00102000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NNSStrm+36be0
    fffff880`06643be0 488b040a        mov     rax,qword ptr [rdx+rcx]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NNSStrm+36be0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NNSStrm
    
    IMAGE_NAME:  NNSStrm.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  538f2f31
    
    FAILURE_BUCKET_ID:  X64_0x50_NNSStrm+36be0
    
    BUCKET_ID:  X64_0x50_NNSStrm+36be0
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x50_nnsstrm+36be0
    
    FAILURE_ID_HASH:  {6ada0785-3aeb-c530-c162-17677b7102cc}
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmvm NNSStrm
    start             end                 module name
    fffff880`0660d000 fffff880`06653000   NNSStrm  T (no symbols)           
        Loaded symbol image file: NNSStrm.sys
        Image path: \SystemRoot\system32\DRIVERS\NNSStrm.sys
        Image name: NNSStrm.sys
        Timestamp:        Wed Jun 04 20:07:37 2014 (538F2F31)
        CheckSum:         0004AEEE
        ImageSize:        00046000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 12:19.
Find Us