Windows 7 BSOD Assistance

csaapproved

New Member
Joined
Apr 14, 2011
Messages
2
Periodic blue screens occurring. Most seem to occur when the machine has been left on for several hours (idling for the most part).

Windows 7 64 bit O/S. Athlon III 3.1 CPU. I believe that I have attached the requisite information, but if not, just let me know.

Thanks.
Fabio
Link Removed
Link RemovedLink RemovedLink RemovedLink Removed
Link Removed
Link Removed
 


Solution
You got a typical memory error:


040811-10077-01.dmp
BugCheck 50, {ffffe8a0002a9024, 1, fffff880012bd043, 7}
PROCESS_NAME: System
FAULTING_IP:
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff lock add dword ptr [rcx+24h],0FFFFFFFFh
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+233 )

040111-10389-01.dmp
BugCheck 50, {ffffe8a0100f0960, 0, fffff80002ffab13, 7}
PROCESS_NAME: System
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8 ffffe8a0100f0960
Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

041411-10140-01.dmp
BugCheck 50, {ffffe8a000231050, 0, fffff880012a8f17, 7}...
You got a typical memory error:


040811-10077-01.dmp
BugCheck 50, {ffffe8a0002a9024, 1, fffff880012bd043, 7}
PROCESS_NAME: System
FAULTING_IP:
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff lock add dword ptr [rcx+24h],0FFFFFFFFh
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+233 )

040111-10389-01.dmp
BugCheck 50, {ffffe8a0100f0960, 0, fffff80002ffab13, 7}
PROCESS_NAME: System
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8 ffffe8a0100f0960
Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

041411-10140-01.dmp
BugCheck 50, {ffffe8a000231050, 0, fffff880012a8f17, 7}
PROCESS_NAME: rundll32.exe
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030cb0e8 ffffe8a000231050
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsOpenExistingPrefixFcb+67 )


Your blue screens come from mismatched memory sticks:

2 Patriots 1600Mhz 9-9-9-24
2 Kingstons 1333Mhz 9-9-9-24

You could try 1333Mhz 9-9-9-24, but if blue screens reoccur then remove the Kingston sticks from slots 1 & 2, and set the Patriots to their rated specs 1600Mhz 9-9-9-24.


It's a good idea to update Cisco anyway:

Citrix Deterministic Network Enhancer Miniport or Cisco Systems VPN Client
dne64x.sys Mon Nov 10 20:01:24 2008
Cisco Systems, Inc


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040811-10077-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e12000 PsLoadedModuleList = 0xfffff800`03057e90
Debug session time: Fri Apr  8 01:11:09.426 2011 (UTC - 4:00)
System Uptime: 0 days 4:26:55.862
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a0002a9024, 1, fffff880012bd043, 7}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteFcb+233 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a0002a9024, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880012bd043, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c30e8
 ffffe8a0002a9024 

FAULTING_IP: 
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800334d7d0 -- (.trap 0xfffff8800334d7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a003e8b010 rbx=0000000000000000 rcx=ffffe8a0002a9000
rdx=0000000000000723 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012bd043 rsp=fffff8800334d960 rbp=fffff8000302f600
 r8=fffff8a003e8b010  r9=0000000000000000 r10=fffffa800a18f420
r11=fffff8a003e8b010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
Ntfs!NtfsDeleteFcb+0x233:
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh ds:c180:ffffe8a0`002a9024=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e3cbf7 to fffff80002e92640

STACK_TEXT:  
fffff880`0334d668 fffff800`02e3cbf7 : 00000000`00000050 ffffe8a0`002a9024 00000000`00000001 fffff880`0334d7d0 : nt!KeBugCheckEx
fffff880`0334d670 fffff800`02e9076e : 00000000`00000001 ffffe8a0`002a9024 fffffa80`09c10100 fffff880`0334d9f0 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`0334d7d0 fffff880`012bd043 : fffff880`0334d9f0 fffff880`0334db01 fffffa80`0a18f370 fffffa80`0a18f370 : nt!KiPageFault+0x16e
fffff880`0334d960 fffff880`01239972 : fffff800`0302f600 fffff880`0334db01 fffff880`0334d9e1 fffff8a0`04006670 : Ntfs!NtfsDeleteFcb+0x233
fffff880`0334d9c0 fffff880`012bf63c : fffffa80`0a18f370 fffffa80`0a11c180 fffff8a0`04006670 fffff8a0`04006a08 : Ntfs!NtfsTeardownFromLcb+0x1e2
fffff880`0334da50 fffff880`012410e2 : fffffa80`0a18f370 fffffa80`0a18f370 fffff8a0`04006670 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xcc
fffff880`0334dad0 fffff880`012cf193 : fffffa80`0a18f370 fffff800`0302f600 fffff8a0`04006670 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`0334db10 fffff880`012be357 : fffffa80`0a18f370 fffff8a0`040067a0 fffff8a0`04006670 fffffa80`0a11c180 : Ntfs!NtfsCommonClose+0x353
fffff880`0334dbe0 fffff800`02e9ca21 : 00000000`00000000 fffff800`0302f600 fffffa80`09a4f601 00000000`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`0334dcb0 fffff800`0312fcce : 00000000`00000000 fffffa80`09a4f680 00000000`00000080 fffffa80`09a3c5f0 : nt!ExpWorkerThread+0x111
fffff880`0334dd40 fffff800`02e83fe6 : fffff880`03164180 fffffa80`09a4f680 fffff880`0316ef80 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0334dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsDeleteFcb+233
fffff880`012bd043 f0834124ff      lock add dword ptr [rcx+24h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsDeleteFcb+233

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsDeleteFcb+233

BUCKET_ID:  X64_0x50_Ntfs!NtfsDeleteFcb+233

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040111-10389-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e4e000 PsLoadedModuleList = 0xfffff800`03093e90
Debug session time: Fri Apr  1 07:49:44.880 2011 (UTC - 4:00)
System Uptime: 0 days 11:02:00.300
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a0100f0960, 0, fffff80002ffab13, 7}


Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

Followup: Pool_corruption
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a0100f0960, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ffab13, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff0e8
 ffffe8a0100f0960 

FAULTING_IP: 
nt!ExDeferredFreePool+257
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880057c1840 -- (.trap 0xfffff880057c1840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe8a0100f0960 rbx=0000000000000000 rcx=fffffa80099ca3c0
rdx=fffff8a0141d9000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ffab13 rsp=fffff880057c19d0 rbp=0000000000000000
 r8=fffff8a009127a20  r9=fffff8a0141d9100 r10=0000000000000001
r11=fffff8a0141d9110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x257:
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11 ds:e170:ffffe8a0`100f0960=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e78bf7 to fffff80002ece640

STACK_TEXT:  
fffff880`057c16d8 fffff800`02e78bf7 : 00000000`00000050 ffffe8a0`100f0960 00000000`00000000 fffff880`057c1840 : nt!KeBugCheckEx
fffff880`057c16e0 fffff800`02ecc76e : 00000000`00000000 ffffe8a0`100f0960 00000000`00000700 00000000`00000003 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`057c1840 fffff800`02ffab13 : fffff880`057c19e1 fffff8a0`041d8010 00000000`01010000 00000000`0c63e100 : nt!KiPageFault+0x16e
fffff880`057c19d0 fffff800`02ffa1a1 : fffff8a0`041d8010 fffff8a0`1555fb30 fffffa80`0c63e170 fffff880`012469f4 : nt!ExDeferredFreePool+0x257
fffff880`057c1a60 fffff880`012d627a : fffffa80`0a13b180 fffff800`0306b600 fffff8a0`6446744e 00000000`00000009 : nt!ExFreePoolWithTag+0x411
fffff880`057c1b10 fffff880`012c5357 : fffffa80`0b503890 fffff8a0`0f656480 fffff8a0`0f656350 fffffa80`0a13b180 : Ntfs!NtfsCommonClose+0x43a
fffff880`057c1be0 fffff800`02ed8a21 : 00000000`00000000 fffff800`031c4f00 fffff800`030cd101 00000000`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`057c1cb0 fffff800`0316bcce : 00000000`00000001 fffffa80`0ccbb040 00000000`00000080 fffffa80`09a3c6f0 : nt!ExpWorkerThread+0x111
fffff880`057c1d40 fffff800`02ebffe6 : fffff880`009e6180 fffffa80`0ccbb040 fffffa80`0b732b60 00000000`00000246 : nt!PspSystemThreadStartup+0x5a
fffff880`057c1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+257
fffff800`02ffab13 4c3918          cmp     qword ptr [rax],r11

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExDeferredFreePool+257

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+257

BUCKET_ID:  X64_0x50_nt!ExDeferredFreePool+257

Followup: Pool_corruption
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\041411-10140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`0305fe90
Debug session time: Thu Apr 14 00:30:01.941 2011 (UTC - 4:00)
System Uptime: 0 days 16:52:33.424
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffffe8a000231050, 0, fffff880012a8f17, 7}


Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsOpenExistingPrefixFcb+67 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a000231050, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012a8f17, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030cb0e8
 ffffe8a000231050 

FAULTING_IP: 
Ntfs!NtfsOpenExistingPrefixFcb+67
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h]

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  rundll32.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88009087da0 -- (.trap 0xfffff88009087da0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00ddde010 rbx=0000000000000000 rcx=fffffa800b409e40
rdx=ffffe8a000231000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012a8f17 rsp=fffff88009087f30 rbp=0000000000000000
 r8=fffff8a00ddde450  r9=0000000000000000 r10=fffffa800b409e40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsOpenExistingPrefixFcb+0x67:
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h] ds:81f0:ffffe8a0`00231050=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e44bf7 to fffff80002e9a640

STACK_TEXT:  
fffff880`09087c38 fffff800`02e44bf7 : 00000000`00000050 ffffe8a0`00231050 00000000`00000000 fffff880`09087da0 : nt!KeBugCheckEx
fffff880`09087c40 fffff800`02e9876e : 00000000`00000000 ffffe8a0`00231050 00000000`00000000 fffff8a0`0ddde450 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`09087da0 fffff880`012a8f17 : 00000008`00000010 00000000`00000000 00000000`03060000 fffff880`09087f48 : nt!KiPageFault+0x16e
fffff880`09087f30 fffff880`012b9166 : fffffa80`0b409e40 fffffa80`0b4b9010 fffff8a0`0ddde450 fffffa80`0bdc5101 : Ntfs!NtfsOpenExistingPrefixFcb+0x67
fffff880`09088020 fffff880`012b6911 : fffffa80`0b409e40 fffffa80`0b4b9010 fffff880`090881f0 fffff880`09088240 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`090880f0 fffff880`0121fa3d : fffffa80`0b409e40 fffffa80`0b4b9010 fffff880`090884a0 fffff880`01134b00 : Ntfs!NtfsCommonCreate+0x3e1
fffff880`090882d0 fffff800`02ea7078 : fffff880`09088410 00000000`00000001 00000000`00000001 00000000`00000001 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`09088300 fffff880`012201bf : fffff880`0121fa20 fffff880`0121f020 fffff880`09088400 fffff880`012c0f00 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`090883e0 fffff880`012b999c : 00000000`00000000 00000000`00000000 fffff880`09088640 fffffa80`0b4b9010 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`09088440 fffff880`01125bcf : fffffa80`0a137030 fffffa80`0b4b9010 00000000`00000000 fffffa80`0a2b6de0 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`090885f0 fffff880`011452b9 : fffffa80`0b4b9010 fffffa80`0a2b65a0 fffffa80`0b4b9000 fffffa80`0a2b6de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09088680 fffff800`03198495 : 00000000`00000005 fffffa80`0bf92cc8 fffffa80`0c1ca010 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`09088730 fffff800`03194d38 : fffffa80`0a13e5f0 fffff800`00000000 fffffa80`0bf92b10 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`090888c0 fffff800`03195f56 : 00000000`00000000 fffffa80`0bf92b10 fffff700`01080000 fffffa80`09a55de0 : nt!ObpLookupObjectName+0x588
fffff880`090889b0 fffff800`0319785c : 00000000`0027bc34 00000000`00000000 00000000`00000001 fffff880`09088ca0 : nt!ObOpenObjectByName+0x306
fffff880`09088a80 fffff800`03183134 : 00000000`0027b5e0 fffff880`00100001 00000000`0027b5f8 00000000`0027b628 : nt!IopCreateFile+0x2bc
fffff880`09088b20 fffff800`02e998d3 : ffffffff`ffffffff 00000000`0027bc70 00000000`0027bbe0 00000980`00000004 : nt!NtOpenFile+0x58
fffff880`09088bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ntfs!NtfsOpenExistingPrefixFcb+67
fffff880`012a8f17 488b4a50        mov     rcx,qword ptr [rdx+50h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  Ntfs!NtfsOpenExistingPrefixFcb+67

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce792f9

FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsOpenExistingPrefixFcb+67

BUCKET_ID:  X64_0x50_Ntfs!NtfsOpenExistingPrefixFcb+67

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`03e00000 fffff880`03e3e000   1394ohci 1394ohci.sys Sat Nov 20 05:44:56 2010 (4CE7A6A8)
fffff880`00e38000 fffff880`00e8f000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`02c00000 fffff880`02c89000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`0364f000 fffff880`03665000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`037bf000 fffff880`037d4000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`010a1000 fffff880`010b5000   amdsata  amdsata.sys  Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`01118000 fffff880`01123000   amdxata  amdxata.sys  Wed Oct 07 16:13:10 2009 (4ACCF656)
fffff880`06bf1000 fffff880`06bfc000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00fe9000 fffff880`00ff2000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`0480b000 fffff880`05132000   atikmdag atikmdag.sys Tue Mar 08 23:32:17 2011 (4D7702D1)
fffff880`03600000 fffff880`0364f000   atikmpag atikmpag.sys Tue Mar 08 23:17:42 2011 (4D76FF66)
fffff880`019ab000 fffff880`019b3000   AtiPcie  AtiPcie.sys  Tue May 05 11:00:22 2009 (4A005486)
fffff880`02d04000 fffff880`02d0b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03788000 fffff880`03799000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06400000 fffff880`0641e000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
fffff960`007d0000 fffff960`007f7000   cdd      cdd.dll      unavailable (00000000)
fffff880`0148b000 fffff880`014b5000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`00d27000 fffff880`00de7000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`0197b000 fffff880`019ab000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00cc9000 fffff880`00d27000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`03fe2000 fffff880`03ff2000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`067e4000 fffff880`067ed000   cpuz135_x64 cpuz135_x64.sys Wed Jan 19 11:42:06 2011 (4D37145E)
fffff880`066bc000 fffff880`066ca000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`036e7000 fffff880`0376a000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`06a00000 fffff880`06a8d000   CVPNDRVA CVPNDRVA.sys Tue Feb 16 09:36:01 2010 (4B7AAD51)
fffff880`0376a000 fffff880`03788000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`036d8000 fffff880`036e7000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01965000 fffff880`0197b000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01072000 fffff880`0109e000   dne64x   dne64x.sys   Mon Nov 10 20:01:24 2008 (4918D964)
fffff880`060eb000 fffff880`0610d000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`066d4000 fffff880`066e8000   dump_amdsata dump_amdsata.sys Wed Oct 07 16:13:09 2009 (4ACCF655)
fffff880`066ca000 fffff880`066d4000   dump_diskdump dump_diskdump.sys Sat Nov 20 05:33:56 2010 (4CE7A414)
fffff880`066e8000 fffff880`066fb000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`066b0000 fffff880`066bc000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e42000 fffff880`03f36000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03f36000 fffff880`03f7c000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`0116f000 fffff880`01183000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01123000 fffff880`0116f000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013e0000 fffff880`013ea000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0192b000 fffff880`01965000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`0180b000 fffff880`01855000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff880`03fa0000 fffff880`03fad000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`03404000 fffff800`0344d000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03f7c000 fffff880`03fa0000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`06728000 fffff880`06741000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06741000 fffff880`06749080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0671a000 fffff880`06728000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`06113000 fffff880`061dc000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01922000 fffff880`0192b000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`04380000 fffff880`0438f000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`0674a000 fffff880`06758000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bb4000 fffff800`00bbe000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`043a0000 fffff880`043e3000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013b4000 fffff880`013cf000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`0610d000 fffff880`06112200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`067b7000 fffff880`067cc000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06773000 fffff880`06796000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ca8000 fffff880`00cb5000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`06765000 fffff880`06773000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`0438f000 fffff880`0439e000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06758000 fffff880`06765000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00f7f000 fffff880`00f99000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`02cca000 fffff880`02cfb000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06a8d000 fffff880`06a9d000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`0641e000 fffff880`06436000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06000000 fffff880`0602d000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
fffff880`0602d000 fffff880`0607a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`06436000 fffff880`0645a000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
fffff880`00e2a000 fffff880`00e35000   msahci   msahci.sys   Sat Nov 20 05:33:58 2010 (4CE7A416)
fffff880`02d69000 fffff880`02d74000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e98000 fffff880`00ea2000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01183000 fffff880`011e1000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`036cd000 fffff880`036d8000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01910000 fffff880`01922000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014dd000 fffff880`015d0000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`042e4000 fffff880`042f0000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`042f0000 fffff880`0431f000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`0425a000 fffff880`0426f000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`02cb8000 fffff880`02cc7000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02db4000 fffff880`02df9000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`06a9d000 fffff880`06ab2000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`02d74000 fffff880`02d85000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`036c1000 fffff880`036cd000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e1a000 fffff800`03404000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01211000 fffff880`013b4000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`02cfb000 fffff880`02d04000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02c92000 fffff880`02cb8000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00ee2000 fffff880`00ef7000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00ea2000 fffff880`00ed5000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00f68000 fffff880`00f6f000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f6f000 fffff880`00f7f000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013cf000 fffff880`013e0000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`054f2000 fffff880`05598000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`060ae000 fffff880`060eb000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cb5000 fffff880`00cc9000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`042c0000 fffff880`042e4000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`0431f000 fffff880`0433a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0433a000 fffff880`0435b000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`0435b000 fffff880`04375000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03670000 fffff880`036c1000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`04375000 fffff880`04380000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02d4e000 fffff880`02d57000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d57000 fffff880`02d60000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d60000 fffff880`02d69000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018d6000 fffff880`01910000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`067cc000 fffff880`067e4000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05132000 fffff880`05199000   Rt64win7 Rt64win7.sys Thu Jan 13 06:57:19 2011 (4D2EE89F)
fffff880`0426f000 fffff880`042ab500   RtHDMIVX RtHDMIVX.sys Mon May 24 08:07:55 2010 (4BFA6C1B)
fffff880`0645c000 fffff880`066af700   RTKVHD64 RTKVHD64.sys Wed Jul 28 06:01:36 2010 (4C500000)
fffff880`018b9000 fffff880`018d6000   sbp2port sbp2port.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`05598000 fffff880`055a3000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03fd6000 fffff880`03fe2000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`014b5000 fffff880`014d2000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`018b1000 fffff880`018b9000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06ae8000 fffff880`06b80000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
fffff880`05400000 fffff880`0546a000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
fffff880`055a3000 fffff880`055d4000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
fffff880`010b5000 fffff880`01118000   storport storport.sys Sat Nov 20 05:35:02 2010 (4CE7A456)
fffff880`0439e000 fffff880`0439f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01607000 fffff880`0180b000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`055d4000 fffff880`055e6000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`02da7000 fffff880`02db4000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`02d85000 fffff880`02da7000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`015eb000 fffff880`015ff000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`00510000 fffff960`0051a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`03799000 fffff880`037bf000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`043e3000 fffff880`043f5000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`066fb000 fffff880`06718000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`06718000 fffff880`06719f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fc5000 fffff880`03fd6000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`03fb8000 fffff880`03fc5000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
fffff880`04200000 fffff880`0425a000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`03fad000 fffff880`03fb8000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05199000 fffff880`051ef000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00ed5000 fffff880`00ee2000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02d0b000 fffff880`02d19000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02d19000 fffff880`02d3e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f99000 fffff880`00fd5000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`01855000 fffff880`01865000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00ef7000 fffff880`00f0c000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00f0c000 fffff880`00f68000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`01865000 fffff880`018b1000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`015d0000 fffff880`015eb000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`02d3e000 fffff880`02d4e000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de7000 fffff880`00df6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c89000 fffff880`02c92000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d2000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
fffff880`00fd5000 fffff880`00fe9000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`037d4000 fffff880`037dd000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00e8f000 fffff880`00e98000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`06796000 fffff880`067b7000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)

Unloaded modules:
fffff880`06b80000 fffff880`06bf1000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`019b3000 fffff880`019c1000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019c1000 fffff880`019cb000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`019cb000 fffff880`019df000   dump_amdsata
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00014000
fffff880`019df000 fffff880`019f2000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


Solution
Back
Top