Random BSOD any help/advice welcome


  1. Posts : 3
    windows 7 professional 64 bit
       #1

    Random BSOD any help/advice welcome


    Random BSOD any help/advice welcome zip file attached
      My Computer


  2. Posts : 15,026
    Windows 10 Home 64Bit
       #2

    Uninstall McAfee and replace it with Microsoft Security Essentials.

    Uninstallation method: Revo Uninstaller

    Use Revo Uninstaller to uninstall stubborn software.



    Microsoft Security Essentials is recommended from a strict BSOD perspective, compatibility & stability compared to other internet security software. Malwarebytes is a great combo to MSE. They are free and lightweight.

    Also uninstall your existing Antivirus software before you install MSE.

    Good and Free system security combination.

       Warning
    Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.



    Download TDSSkiller and run a scan on your PC:

    Download Kaspersky TDSSKiller 3.1.0.9 - FileHippo.com

    Run the System File Checker that scans the of all protected Windows 7 system files and replaces incorrect corrupted, changed/modified, or damaged versions with the correct versions if possible:
    • Click on the
    • Type CMD on Search
    • Left click and Run as Administrator
    • Type SFC /scannow

    Full tutorial here:

    Run Disk Check on your Hard Drive for file system errors and bad sectors on it.

     Hard Drive Diagnostics


    • Double click and open my computer.
    • Right click on desired drive and hit properties.
    • Click on tools tab and Check now.


    Read complete instructions on the tutorial: Disk Check

    Other Tests:
     





    Code:
    
    Microsoft (R) Windows Debugger Version 10.0.10240.9 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\YUSRA\Downloads\HOME-PC-15_12_2015_230500_81\121515-28546-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\Visualizers.
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.19045.amd64fre.win7sp1_gdr.151019-1254
    Machine Name:
    Kernel base = 0xfffff800`03a1a000 PsLoadedModuleList = 0xfffff800`03c61730
    Debug session time: Wed Dec 16 03:49:28.224 2015 (UTC + 6:00)
    System Uptime: 0 days 0:46:25.208
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ........................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, fffff88011a3e1c8, fffff88011a3da20, fffff80003aa85ee}
    
    Probably caused by : ntkrnlmp.exe ( nt!SepMandatoryIntegrityCheck+2ae )
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 00000000001904fb
    Arg2: fffff88011a3e1c8
    Arg3: fffff88011a3da20
    Arg4: fffff80003aa85ee
    
    Debugging Details:
    ------------------
    
    
    SYSTEM_SKU:  To Be Filled By O.E.M.
    
    SYSTEM_VERSION:  3.0
    
    BIOS_DATE:  01/07/2010
    
    BASEBOARD_PRODUCT:  MSI X58 Pro-E (MS-7522)
    
    BASEBOARD_VERSION:  3.0
    
    BUGCHECK_P1: 1904fb
    
    BUGCHECK_P2: fffff88011a3e1c8
    
    BUGCHECK_P3: fffff88011a3da20
    
    BUGCHECK_P4: fffff80003aa85ee
    
    EXCEPTION_RECORD:  fffff88011a3e1c8 -- (.exr 0xfffff88011a3e1c8)
    ExceptionAddress: fffff80003aa85ee (nt!SepMandatoryIntegrityCheck+0x00000000000002ae)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    CONTEXT:  fffff88011a3da20 -- (.cxr 0xfffff88011a3da20)
    rax=ae3ad92da47e9ba5 rbx=0000000000000080 rcx=0000000000000000
    rdx=0000000000000000 rsi=fffff8a003b324f0 rdi=fffff88011a3e510
    rip=fffff80003aa85ee rsp=fffff88011a3e400 rbp=0000000000000000
     r8=fffffa8005c2d600  r9=fffff8a003b324f0 r10=fffff880089c9768
    r11=fffff88011a3e468 r12=fffff88011a3e780 r13=fffff8a0049c231c
    r14=fffff8a003b324f0 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    nt!SepMandatoryIntegrityCheck+0x2ae:
    fffff800`03aa85ee 0fb74804        movzx   ecx,word ptr [rax+4] ds:002b:ae3ad92d`a47e9ba9=????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: c02
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 1a
    
    CPU_STEPPING: 5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    PROCESS_NAME:  mbamscheduler.
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ccb100
    GetUlongPtrFromAddress: unable to read from fffff80003ccb2e0
    GetUlongPtrFromAddress: unable to read from fffff80003ccb490
     ffffffffffffffff 
    
    FOLLOWUP_IP: 
    nt!SepMandatoryIntegrityCheck+2ae
    fffff800`03aa85ee 0fb74804        movzx   ecx,word ptr [rax+4]
    
    FAULTING_IP: 
    nt!SepMandatoryIntegrityCheck+2ae
    fffff800`03aa85ee 0fb74804        movzx   ecx,word ptr [rax+4]
    
    BUGCHECK_STR:  0x24
    
    ANALYSIS_VERSION: 10.0.10240.9 x86fre
    
    LAST_CONTROL_TRANSFER:  from fffff80003aa006b to fffff80003aa85ee
    
    STACK_TEXT:  
    fffff880`11a3e400 fffff800`03aa006b : 00000000`00000080 00000000`3b4dc85c fffff8a0`03b324f0 00000000`00000000 : nt!SepMandatoryIntegrityCheck+0x2ae
    fffff880`11a3e470 fffff880`012c3dd3 : fffffa80`05490180 fffff8a0`049c231c 00000000`00000000 00000000`00000000 : nt!SeAccessCheckWithHint+0x3fb
    fffff880`11a3e570 fffff880`012bf347 : fffffa80`05c2d610 00000000`00000000 fffff8a0`13899b40 00000000`00000080 : Ntfs!TxfAccessCheck+0x123
    fffff880`11a3e6e0 fffff880`012acdf3 : fffffa80`0b279500 fffff880`089c9290 fffff8a0`13899b40 fffff8a0`03a40510 : Ntfs!NtfsAccessCheck+0x1b7
    fffff880`11a3e8c0 fffff880`012ad1df : 00000000`00000000 fffff8a0`13899b40 00000000`00000002 fffffa80`07b38000 : Ntfs!NtfsCheckExistingFile+0xc3
    fffff880`11a3e950 fffff880`012a8f5b : fffff880`089c9290 fffffa80`0b279500 fffff8a0`13899ed8 fffff8a0`00000084 : Ntfs!NtfsOpenExistingAttr+0x20f
    fffff880`11a3ea10 fffff880`012ac1cf : fffffa80`0b279500 fffffa80`06841bd0 fffff8a0`13899ed8 fffff880`00000084 : Ntfs!NtfsOpenAttributeInExistingFile+0x5ab
    fffff880`11a3eba0 fffff880`012bc306 : fffffa80`0b279500 fffffa80`06841bd0 fffff8a0`13899ed8 00000000`00000701 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
    fffff880`11a3ec90 fffff880`012b9af3 : fffffa80`0b279500 fffffa80`06841bd0 fffff880`11a3ee70 fffff880`11a3eea8 : Ntfs!NtfsFindStartingNode+0x5e6
    fffff880`11a3ed60 fffff880`012243ad : fffffa80`0b279500 fffffa80`06841bd0 fffff880`089c9290 fffffa80`09de6b00 : Ntfs!NtfsCommonCreate+0x3d3
    fffff880`11a3ef30 fffff800`03a85737 : fffff880`089c9200 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
    fffff880`11a3ef60 fffff800`03a856f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
    fffff880`089c90d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!SepMandatoryIntegrityCheck+2ae
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5625815c
    
    IMAGE_VERSION:  6.1.7601.19045
    
    STACK_COMMAND:  .cxr 0xfffff88011a3da20 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x24_nt!SepMandatoryIntegrityCheck+2ae
    
    BUCKET_ID:  X64_0x24_nt!SepMandatoryIntegrityCheck+2ae
    
    PRIMARY_PROBLEM_CLASS:  X64_0x24_nt!SepMandatoryIntegrityCheck+2ae
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x24_nt!sepmandatoryintegritycheck+2ae
    
    FAILURE_ID_HASH:  {ed6e1db0-56d3-e899-d50e-149228313dde}
    
    Followup:     MachineOwner
    ---------
    
    
      My Computer


  3. Posts : 3
    windows 7 professional 64 bit
    Thread Starter
       #3

    Thanks @koolkat77 for the info/advice, I did follow your advice, all went well up until chckdsk when another BSOD happened... file attached
      My Computer


  4. Posts : 15,026
    Windows 10 Home 64Bit
       #4

    Please wait a while and see if the BSOD's occur again.
      My Computer


  5. Posts : 3
    windows 7 professional 64 bit
    Thread Starter
       #5

    Thanks @koolcat77 No BSOD's for over a week now your advice seems to have worked
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:37.
Find Us