Windows 7 BDOS ntfs.sys and ntoskrnl.exe HELP!!

Theindian

New Member
Hi,

I have been getting Blue screens related to ntfs.sys and ntoskrnl.exe for last week. I tried reformatting my computer but they havent stopped. I am attaching the dump files and the cpuz screen shots.

Thank you in advance :eek:
 

Attachments

  • Dump Files.zip
    64.2 KB · Views: 191
  • Memory CPUZ.PNG
    Memory CPUZ.PNG
    33.2 KB · Views: 495
  • SPD CPUZ.PNG
    SPD CPUZ.PNG
    25.9 KB · Views: 508
Hello there,

Seems like it could be Hardware related. Few things we have to do.

Run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger (RAM and Hard drive)
If your Overclocking please reset to default values
Uninstall any third party Firewall / Internet Security as if now.

Code:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a800259a4c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002e560d1, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf40e0
 fffff8a800259a4c 

FAULTING_IP: 
nt!MmEnumerateAndReferenceImages+151
fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch]

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  userinit.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880073726c0 -- (.trap 0xfffff880073726c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a000259950 rbx=0000000000000000 rcx=fffff8a800259a10
rdx=fffffa8004a3732b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e560d1 rsp=fffff88007372850 rbp=fffffa8004a374f0
 r8=000000000000000c  r9=fffffa800365ba00 r10=fffffa800365b148
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MmEnumerateAndReferenceImages+0x151:
fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch] ds:fffff8a8`00259a4c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002b3bb91 to fffff80002abdf00

STACK_TEXT:  
fffff880`07372558 fffff800`02b3bb91 : 00000000`00000050 fffff8a8`00259a4c 00000000`00000000 fffff880`073726c0 : nt!KeBugCheckEx
fffff880`07372560 fffff800`02abbfee : 00000000`00000000 fffffa80`05b25ae0 fffff800`02c4b800 fffffa80`05dee000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`073726c0 fffff800`02e560d1 : 00000000`00000001 fffffa80`05b25ae0 00000000`0000010e 00000000`000007ff : nt!KiPageFault+0x16e
fffff880`07372850 fffff800`02d18958 : fffffa80`05b2db30 fffff880`07372940 00000000`00000000 00000000`000007e4 : nt!MmEnumerateAndReferenceImages+0x151
fffff880`073728d0 fffff800`02d799c2 : fffffa80`05b2db30 00000000`00000000 fffffa80`05b25ae0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x212a9
fffff880`07372a70 fffff800`02da06eb : 000007ff`fffde000 00000000`00000001 00000000`00000000 fffffa80`053f5910 : nt!PspExitProcess+0x4e
fffff880`07372ad0 fffff800`02d79cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x3bb
fffff880`07372ba0 fffff800`02abd153 : fffffa80`05b2db30 fffff880`00000000 fffffa80`05b25ae0 00000000`00000000 : nt!NtTerminateProcess+0x138
fffff880`07372c20 00000000`77b0017a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0026f728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0017a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MmEnumerateAndReferenceImages+151
fffff800`02e560d1 8b413c          mov     eax,dword ptr [rcx+3Ch]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MmEnumerateAndReferenceImages+151

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc600

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!MmEnumerateAndReferenceImages+151

BUCKET_ID:  X64_0x50_nt!MmEnumerateAndReferenceImages+151

Followup: MachineOwner
---------
 
Back
Top