BDOS ntfs.sys and ntoskrnl.exe HELP!!

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Theindian, Jun 9, 2011.

  1. Theindian

    Theindian New Member

    Joined:
    Jun 9, 2011
    Messages:
    2
    Likes Received:
    0
    Hi,

    I have been getting Blue screens related to ntfs.sys and ntoskrnl.exe for last week. I tried reformatting my computer but they havent stopped. I am attaching the dump files and the cpuz screen shots.

    Thank you in advance :eek:
     

    Attached Files:

  2. Captain Jack

    Captain Jack Extraordinary Member

    Joined:
    Mar 6, 2010
    Messages:
    1,952
    Likes Received:
    139
    Hello there,

    Seems like it could be Hardware related. Few things we have to do.

    Run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger (RAM and Hard drive)
    If your Overclocking please reset to default values
    Uninstall any third party Firewall / Internet Security as if now.

    Code:
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a800259a4c, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff80002e560d1, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf40e0
     fffff8a800259a4c 
    
    FAULTING_IP: 
    nt!MmEnumerateAndReferenceImages+151
    fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  userinit.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880073726c0 -- (.trap 0xfffff880073726c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a000259950 rbx=0000000000000000 rcx=fffff8a800259a10
    rdx=fffffa8004a3732b rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002e560d1 rsp=fffff88007372850 rbp=fffffa8004a374f0
     r8=000000000000000c  r9=fffffa800365ba00 r10=fffffa800365b148
    r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MmEnumerateAndReferenceImages+0x151:
    fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch] ds:fffff8a8`00259a4c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002b3bb91 to fffff80002abdf00
    
    STACK_TEXT:  
    fffff880`07372558 fffff800`02b3bb91 : 00000000`00000050 fffff8a8`00259a4c 00000000`00000000 fffff880`073726c0 : nt!KeBugCheckEx
    fffff880`07372560 fffff800`02abbfee : 00000000`00000000 fffffa80`05b25ae0 fffff800`02c4b800 fffffa80`05dee000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
    fffff880`073726c0 fffff800`02e560d1 : 00000000`00000001 fffffa80`05b25ae0 00000000`0000010e 00000000`000007ff : nt!KiPageFault+0x16e
    fffff880`07372850 fffff800`02d18958 : fffffa80`05b2db30 fffff880`07372940 00000000`00000000 00000000`000007e4 : nt!MmEnumerateAndReferenceImages+0x151
    fffff880`073728d0 fffff800`02d799c2 : fffffa80`05b2db30 00000000`00000000 fffffa80`05b25ae0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x212a9
    fffff880`07372a70 fffff800`02da06eb : 000007ff`fffde000 00000000`00000001 00000000`00000000 fffffa80`053f5910 : nt!PspExitProcess+0x4e
    fffff880`07372ad0 fffff800`02d79cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x3bb
    fffff880`07372ba0 fffff800`02abd153 : fffffa80`05b2db30 fffff880`00000000 fffffa80`05b25ae0 00000000`00000000 : nt!NtTerminateProcess+0x138
    fffff880`07372c20 00000000`77b0017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0026f728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0017a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MmEnumerateAndReferenceImages+151
    fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MmEnumerateAndReferenceImages+151
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x50_nt!MmEnumerateAndReferenceImages+151
    
    BUCKET_ID:  X64_0x50_nt!MmEnumerateAndReferenceImages+151
    
    Followup: MachineOwner
    ---------
    
    
     

Share This Page

Loading...