Windows 7 Bsod in windows 7 error

Smity21

New Member
i'm new to this forum and i wanna ask you something about windows 7 BSOD's errors! i have some BSOD's errors and i don't know how to solve this error's! my pc configuration is: Processor Amd Phenom X3 triple core 2.31 ghz , 3 gb RAM DDR II 667 mhz , hdd 500 gb , video G-force Gt 240 512 MB DDR3 . i will upload the crash memory dumps here and i hope u will take a look at them and help me to sort it out with this errors. i'll wait for an answer as soon as possible! thx. i think is from ntkrnlpa.exe. help me to sort it out! plss...
 

Attachments

  • 101910-14055-01.dmp
    150.5 KB · Views: 509
  • 101910-13572-01.dmp
    150.4 KB · Views: 486
what is exactly MSE and where i can find to install it? can u help me with that? Uninstall Kaspersky in safe mode using the tool found here:

AV Uninstallers - Windows 7 Forums . the kaspersky was the cause of BSOD? can u tell me what anti virus should i install to have on my pc or what programm do i need to stay safe from viruses? thx for help and i'll wait for an answer as soon as possible.
 
Google is very helpful. Follow exactly as I've posted and things will be well, without further concern needed at all.

Yes, Kaspersky caused the bsods.
 
what antivirus do u say to install? or is good to stay without antivirus? plsss... tell me what antivirus i should install without kaspersky. i'll wait for an answer as soon as possible.
 
i have uninstalled kaspersky internet security with another kaspersky remover that i haved in my computer because that one from the link doesn't worked because was for kaspersky anti virus and this one was for kaspersky internet security and of course i have uninstalled in safe mode. the MSE is
moz-screenshot.png
Microsoft Security Essentials is to replace the kaspersky internet security and keep the pc away from the spyware and virus. thx for the support and if i did it wrong announce me as soon as possible. if i had problem in the future i let u know.
 
I had the same problem twice on my machine. I have Win 7 Home Premium 64bit and twice got the BSOD. The second was after restoring from a backup. The culprit is an incompatibility between Kaspersky and certain windows updates. For the 64 bit edition remove the following updates:
KB971468 - Vulnerabilities in SMB Server
KB975560 - security update for Quartz
KB978251 - Vulnerabilities in SMB client

For the 32bit edition remove:
KB977165

To do this if you are having the BSOD and can not get into Windows boot into safe mode (F8 on startup before the Windows logo appears), then go to windows updates, find the updates above and uninstall them. Then simply restart and you should be good to go.

I have found this solution from here: Link Removed - Invalid URL

Hope this helps and it means you can keep Kaspersky installed.
 
I had the same problem twice on my machine. I have Win 7 Home Premium 64bit and twice got the BSOD. The second was a week after restoring from a backup, actually just this morning! The culprit is an incompatibility between Kaspersky and certain windows updates. For the 64 bit edition remove the following updates:
KB971468 - Vulnerabilities in SMB Server
KB975560 - security update for Quartz
KB978251 - Vulnerabilities in SMB client

For the 32bit edition remove:
KB977165
This update was not released for the 64bit version

To do this if you are having the BSOD and can not get into Windows boot into safe mode (F8 on startup before the Windows logo appears), then go to windows updates, find the updates above and uninstall them. Then simply restart and you should be good to go.

I have found this solution from here: Link Removed - Invalid URL

Hope this helps and it means you can keep Kaspersky installed.

The weird thing was that the updates were installed back in March, but only affected my computer in October, so something else may have triggered it, but removing them certainly fixed it.
 
Hope this helps and it means you can keep Kaspersky installed.

IMHO, not worth it as MSE has never caused bsods under any circumstances, doesn't do so now and will never in the future.

Uninstalling MS patches is not a valid solution to bsod solving.
 
Would normally agree, but in a business environment such as mine, unintrusive firewalls (MSE doesn't have one and the Windows one?!). Also I've paid for the software. The updates don't pose any threat to the system in this case. Wish Kaspersky would find and fix the fault, but it seems it doesn't affect everyone as my laptop has the same software installed and never had the problem. I'd rather miss a couple of "security" updates and have far better online protection than have an exposed system.

For others the free software is suitable, but in my case this was the best solution.
 
Would normally agree, but in a business environment such as mine, unintrusive firewalls (MSE doesn't have one and the Windows one?!) and fantastic malware detection (yes I've tested this against many of the leading brands) is more important. Also I've paid for the software! Not having these updates doesn't pose any threat to the system in this case.

I do wish though that Kaspersky would find and fix the fault, but it seems it doesn't affect everyone as my laptop has the same software installed and never had the problem. I'd rather miss a couple of "security" updates and have far better online protection than have an exposed system. I realise there are free alternatives, but I believe you get what you pay for. MSE is a great piece of software in the right situations, but in my case removing the updates was the best solution.
 
i have new BSOD problem. need help. One bsod said something about Bios i think and the other one said something about antivirus or something like that. i don't know what to do exactly. i need help as soon as possible. plss...i' ll wait for an answer and hope to solve this problem and terminate with this annoying BSOD's problmes. thanks for support.
 

Attachments

  • 102310-13244-01.dmp
    150.6 KB · Views: 409
  • 102310-14757-01.dmp
    156.6 KB · Views: 413
Open an elevated command prompt. Run this command for each partition on the system that is on a hard drive. Change C to match them each time:

chkdsk /r C:

Remove all external drives or USB sticks until issues are completely sorted, as one of them could be the culprit.

---------

You had an error also in cdd.dll. Very likely RAM needs replacement. Test overnight with Memtest86+ to see if any errors show.
 
Playing FIFA, huh?

Errors 50 and 24.

1. Check the hard drive:

Disk Check - Windows 7 Forums

and diagnose it if the crashes persist:

Link Removed - Invalid URL



2. Update the nForce drivers:

nvstor.sys Wed May 20 09:44:09 2009
nvstor32.sys Wed Aug 05 03:27:05 2009
nvm62x32.sys Thu Nov 12 01:16:22 2009
nForce




Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [G:\102310-13244-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c0f000 PsLoadedModuleList = 0x82d57810
Debug session time: Sat Oct 23 21:31:59.291 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:32.336
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 001904fb
Arg2: a49d7814
Arg3: a49d73f0
Arg4: 82e8e39d

Debugging Details:
------------------


EXCEPTION_RECORD:  a49d7814 -- (.exr 0xffffffffa49d7814)
ExceptionAddress: 82e8e39d (nt!SeAppendPrivileges+0x00000015)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 00000000
Attempt to read from address 00000000

CONTEXT:  a49d73f0 -- (.cxr 0xffffffffa49d73f0)
eax=87cae650 ebx=87cae6f0 ecx=8b2b4017 edx=00000000 esi=87cae684 edi=00000000
eip=82e8e39d esp=a49d78dc ebp=a49d78e8 iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
nt!SeAppendPrivileges+0x15:
82e8e39d 8b07            mov     eax,dword ptr [edi]  ds:0023:00000000=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  00000000

READ_ADDRESS: GetPointerFromAddress: unable to read from 82d77718
Unable to read MiSystemVaType memory at 82d57160
 00000000 

FOLLOWUP_IP: 
Ntfs!NtfsAccessCheck+139
8b2ae125 ff75e0          push    dword ptr [ebp-20h]

FAULTING_IP: 
nt!SeAppendPrivileges+15
82e8e39d 8b07            mov     eax,dword ptr [edi]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from 8b2ae125 to 82e8e39d

STACK_TEXT:  
a49d78e8 8b2ae125 87cae650 00000000 2fbb72d9 nt!SeAppendPrivileges+0x15
a49d79fc 8b2c3df8 8744bdb8 a497f944 a152ab10 Ntfs!NtfsAccessCheck+0x139
a49d7bf4 8b2b532c 8744bdb8 854d6868 a152ac00 Ntfs!NtfsCreateNewFile+0x2fc
a49d7cdc 8b23b210 8744bdb8 854d6868 a497f944 Ntfs!NtfsCommonCreate+0xd2f
a49d7d1c 82c7f11e a497f8dc 00000000 ffffffff Ntfs!NtfsCommonCreateCallout+0x20
a49d7d1c 82c7f215 a497f8dc 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
a497f840 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsAccessCheck+139

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45

STACK_COMMAND:  .cxr 0xffffffffa49d73f0 ; kb

FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsAccessCheck+139

BUCKET_ID:  0x24_Ntfs!NtfsAccessCheck+139

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [G:\102310-14757-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c01000 PsLoadedModuleList = 0x82d49810
Debug session time: Sat Oct 23 07:31:30.069 2010 (UTC - 5:00)
System Uptime: 0 days 2:02:42.114
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffb885dc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 98b8b768, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 82d69718
Unable to read MiSystemVaType memory at 82d49160
 ffb885dc 

FAULTING_IP: 
cdd!CddBitmapHw::Release+1e
98b8b768 3b81cc050000    cmp     eax,dword ptr [ecx+5CCh]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  fifa.exe

CURRENT_IRQL:  0

TRAP_FRAME:  a238ea74 -- (.trap 0xffffffffa238ea74)
ErrCode = 00000000
eax=85ae5888 ebx=8fefa07e ecx=ffb88010 edx=00000001 esi=fe0073a8 edi=00000000
eip=98b8b768 esp=a238eae8 ebp=a238eb14 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
cdd!CddBitmapHw::Release+0x1e:
98b8b768 3b81cc050000    cmp     eax,dword ptr [ecx+5CCh] ds:0023:ffb885dc=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82c47638 to 82c86903

STACK_TEXT:  
a238ea5c 82c47638 00000000 ffb885dc 00000000 nt!MmAccessFault+0x106
a238ea5c 98b8b768 00000000 ffb885dc 00000000 nt!KiTrap0E+0xdc
a238eb14 98b81753 fe0073a8 a238ebb4 989bd50c cdd!CddBitmapHw::Release+0x1e
a238eb20 989bd50c fe0073a8 00000002 a238ebd8 cdd!DrvDeleteDeviceBitmapEx+0x39
a238ebb4 989be920 00000001 00000000 460513db win32k!SURFACE::bDeleteSurface+0x235
a238ebc8 989c0e1d 00000001 00000001 fe2aadb0 win32k!SURFREF::bDeleteSurface+0x14
a238ebdc 989c05bd 000016d4 00000001 000016d4 win32k!vCleanupSurfaces+0x43
a238ebfc 989bc25a fe2706b8 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
a238ec1c 989beb3f fe2706b8 00000000 873bfdd8 win32k!GdiProcessCallout+0x151
a238ec38 82e49b98 858c1670 00000000 8415dc38 win32k!W32pProcessCallout+0x5d
a238ecb4 82e7e1e1 00000000 85831a28 00000001 nt!PspExitThread+0x46d
a238eccc 82ca9133 85831a28 a238ecf8 a238ed04 nt!PsExitSpecialApc+0x22
a238ed1c 82c44504 00000001 00000000 a238ed34 nt!KiDeliverApc+0x28b
a238ed1c 76fc64f4 00000001 00000000 a238ed34 nt!KiServiceExit+0x64
WARNING: Frame IP not in any known module. Following frames may be wrong.
2658fef0 00000000 00000000 00000000 00000000 0x76fc64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
cdd!CddBitmapHw::Release+1e
98b8b768 3b81cc050000    cmp     eax,dword ptr [ecx+5CCh]

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  cdd!CddBitmapHw::Release+1e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: cdd

IMAGE_NAME:  cdd.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bd992

FAILURE_BUCKET_ID:  0x50_cdd!CddBitmapHw::Release+1e

BUCKET_ID:  0x50_cdd!CddBitmapHw::Release+1e

Followup: MachineOwner


98365000 98391000   000      000.fcl      Fri Sep 26 16:11:12 2008 (48DCDF70)
8ae17000 8ae5f000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8ff59000 8ffb3000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
939ea000 939fc000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
8fb10000 8fb21000   amdppm   amdppm.sys   Tue Jul 14 02:11:03 2009 (4A5BBF07)
8afe7000 8aff0000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
8af4f000 8af58000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
8af58000 8af7b000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
8aebe000 8aec9000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
8fec5000 8fecc000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8fae1000 8faef000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
83251000 83259000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
96bb3000 96bcc000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
98b80000 98b9e000   cdd      cdd.dll      Tue Jul 14 04:04:18 2009 (4A5BD992)
8fe7c000 8fe9b000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8329b000 83346000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8b3a5000 8b3ca000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
83259000 8329b000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b17c000 8b1d9000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
8aeb6000 8aebe000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
939dd000 939ea000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
9739d000 973aa000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
8fa65000 8fac9000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
8fac9000 8fae1000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
8fa59000 8fa65000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b418000 8b429000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
97359000 97372000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
973aa000 973b4000   dump_diskdump dump_diskdump.sys Tue Jul 14 02:45:49 2009 (4A5BC72D)
973eb000 973fc000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
973b4000 973eb000   dump_nvstor32 dump_nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
97393000 9739d000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
90894000 9094b000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
939a4000 939dd000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
9cc7b000 9cca5000   fastfat  fastfat.SYS  Tue Jul 14 02:14:01 2009 (4A5BBFB9)
8fb21000 8fb2c000   fdc      fdc.sys      Tue Jul 14 02:45:45 2009 (4A5BC729)
8ae00000 8ae11000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
96a71000 96a7b000   flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
83200000 83234000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b1e7000 8b1f0000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
8b373000 8b3a5000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
8b574000 8b5a5000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
83011000 83048000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
9082e000 9084d000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
96b2e000 96bb3000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
8b410000 8b418000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
8fb4e000 8fb66000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
8fb73000 8fb80000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
80bcf000 80bd7000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
96a2f000 96a63000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
8b169000 8b17c000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b321000 8b346000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
96b0b000 96b1b000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9700b000 97026000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
83235000 83240000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
97000000 9700b000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
8fb66000 8fb73000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8af39000 8af4f000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
8fe9b000 8febe000   MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
983e0000 983e8e00   MpNWMon  MpNWMon.sys  Sat Mar 20 06:03:24 2010 (4BA4490C)
96bcc000 96bde000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
96a00000 96a23000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
8fe2d000 8fe68000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
96bde000 96bf9000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
8ff1e000 8ff29000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8ae68000 8ae70000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8b13e000 8b169000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8fa4f000 8fa59000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b400000 8b410000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b22c000 8b2e3000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
93000000 9300b000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
90963000 90985000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
96abf000 96ad0000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
8fe1f000 8fe2d000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
8ffb3000 8ffe5000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
8b2e3000 8b321000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
8ff29000 8ff37000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
8fa45000 8fa4f000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
82c01000 83011000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8b00f000 8b13e000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
8febe000 8fec5000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
939a2000 939a3040   nvBridge nvBridge.kmd Fri Oct 08 09:50:24 2010 (4CAEBF30)
97372000 97393000   nvhda32v nvhda32v.sys Tue Sep 07 23:08:20 2010 (4C869BB4)
9300c000 939a1420   nvlddmkm nvlddmkm.sys Fri Oct 08 09:52:05 2010 (4CAEBF95)
9084d000 90893700   nvm62x32 nvm62x32.sys Thu Nov 12 01:16:22 2009 (4AFB45C6)
8af7b000 8afa0000   nvstor   nvstor.sys   Wed May 20 09:44:09 2009 (4A13A6B9)
833c5000 833fc000   nvstor32 nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
8fe00000 8fe1f000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
8fb36000 8fb4e000   parport  parport.sys  Tue Jul 14 02:45:34 2009 (4A5BC71E)
8aea5000 8aeb6000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
97026000 9702d000   parvdm   parvdm.sys   Tue Jul 14 02:45:29 2009 (4A5BC719)
8ae7b000 8aea5000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
8af24000 8af2b000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
8af2b000 8af39000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b1d9000 8b1e7000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
9822c000 982c3000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
9732a000 97359000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
83240000 83251000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
9094b000 90963000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
90985000 9099d000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
9099d000 909b4000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
909b4000 909cb000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
8fa04000 8fa45000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
909cb000 909d5000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
8ff06000 8ff0e000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8ff0e000 8ff16000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8ff16000 8ff1e000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8b346000 8b373000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
96b1b000 96b2e000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
9702e000 973292c0   RTKVHDA  RTKVHDA.sys  Tue Jul 06 13:02:40 2010 (4C32FF40)
96aea000 96b0b000   SbieDrv  SbieDrv.sys  Mon Oct 18 01:40:57 2010 (4CBB7B79)
8b210000 8b21da60   SCDEmu   SCDEmu.SYS   Mon Apr 12 11:44:34 2010 (4BC2DD72)
982c3000 982cd000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
8fb2c000 8fb36000   serenum  serenum.sys  Tue Jul 14 02:45:27 2009 (4A5BC717)
8b3d7000 8b3f1000   serial   serial.sys   Tue Jul 14 02:45:33 2009 (4A5BC71D)
8b5ed000 8b5f5000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
9cc2a000 9cc7b000   srv      srv.sys      Fri Aug 27 06:31:26 2010 (4C77318E)
98391000 983e0000   srv2     srv2.sys     Fri Aug 27 06:30:45 2010 (4C773165)
98337000 98358000   srvnet   srvnet.sys   Fri Aug 27 06:30:39 2010 (4C77315F)
8afa0000 8afe7000   storport storport.sys Tue Jul 14 02:45:58 2009 (4A5BC736)
939fc000 939fd380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
8b42b000 8b574000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
98358000 98365000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
8ff4e000 8ff59000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8ff37000 8ff4e000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8b200000 8b210000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
98b50000 98b59000   TSDDD    TSDDD.dll    unavailable (00000000)
8faef000 8fb10000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
96a63000 96a71000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
8fbd5000 8fbe4000   usbehci  usbehci.sys  Sat Oct 24 06:58:55 2009 (4AE27B7F)
96a7b000 96abf000   usbhub   usbhub.sys   Sat Oct 24 07:00:05 2009 (4AE27BC5)
8fb80000 8fb8a000   usbohci  usbohci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
8fb8a000 8fbd5000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
8ae70000 8ae7b000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8fecc000 8fed8000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
8fed8000 8fef9000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8b5a5000 8b5ad380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8aec9000 8aed9000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8aed9000 8af24000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8b5ae000 8b5ed000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
8ffec000 8ffff000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
8fef9000 8ff06000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
83346000 833b7000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
833b7000 833c5000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8ffe5000 8ffec000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
988f0000 98b3b000   win32k   win32k.sys   Wed Sep 01 05:34:29 2010 (4C7DBBB5)
8ae5f000 8ae68000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
96ad0000 96aea000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)

Unloaded modules:
982cd000 98337000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
8b3ca000 8b3d7000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8b5f5000 8b5ff000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
8fe34000 8fe6b000   dump_nvstor3
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00037000
8fe6b000 8fe7c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
yes that's right. i love playing sim football games. but this shouldn't gave an error. and can u tell me how to update this drivers and from where? i didn't get any respons even in my anterior posts.2. Update the nForce drivers:

nvstor.sys Wed May 20 09:44:09 2009
nvstor32.sys Wed Aug 05 03:27:05 2009
nvm62x32.sys Thu Nov 12 01:16:22 2009
nForce
i have run chdsk on C and said after that is clean. i will run for the next volumes to see what happened. Wait for an answer as soon as possible.
 
i have another 2 BSOD errors and i will run the check disk for all the partition and fix fixed the errors if it is, need help to resolve this problem. i feel i cannot take it anymore. i don't know what to do. i'll hope u guys u can help me out to solve this problems. thanks for support. i'll wait for an answer as soon as possible. i will copy the files nvstor.sys
nvstor32.sys
nvm62x32.sys
nvm62x32.sys i did with the other one from C;nvidia/nfrocewin7Vistaint\Ide\win7\sata.. to c:windows/system32/drivers
i didn't find nvstor32.sys from C;nvidia/nfrocewin7Vistaint and i don't know from where to take it and update it. can u tell me how to update this drivers and from where? i haved run the chdsk and i didn't have any errors . need a response as soon as possible, i'll wait for an answer.
 

Attachments

  • 102410-15132-01.dmp
    136.5 KB · Views: 404
  • 102410-16130-01.dmp
    149.7 KB · Views: 425
Last edited:
nForce ---->>> Drivers - Download NVIDIA Drivers


102410-15132-01.dmp
NTFS_FILE_SYSTEM (24)

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82db5718
Unable to read MiSystemVaType memory at 82d95160 00000018
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
Stack: nt! fltmgr! ntfs!
FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsLookupNtfsMcbEntry+17


102410-16130-01.dmp
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)

Probably caused by : MpFilter.sys ( MpFilter+ec9c ) (lol, it crashed, but blame ntfs I guess)
PROCESS_NAME: svchost.exe
Stack: nt! fltmgr! mpfilter!




Check you hard disk:

1. For errors (cmd -> chkdsk /r /f)

Disk Check - Windows 7 Forums


2. Diagnose it, see if HDDScan reports any problems such as yellow and red mark warnings

HDDScan

Link Removed - Invalid URL (This one is harder but more thorough)



Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102410-15132-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c4d000 PsLoadedModuleList = 0x82d95810
Debug session time: Sun Oct 24 09:00:02.694 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:17.489
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 001904fb
Arg2: 8d0efe20
Arg3: 8d0efa00
Arg4: 82ceab79

Debugging Details:
------------------


EXCEPTION_RECORD:  8d0efe20 -- (.exr 0xffffffff8d0efe20)
ExceptionAddress: 82ceab79 (nt!ExAcquireFastMutex+0x00000012)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 00000018
Attempt to write to address 00000018

CONTEXT:  8d0efa00 -- (.cxr 0xffffffff8d0efa00)
eax=00000018 ebx=86431d00 ecx=00000001 edx=00000000 esi=00000018 edi=8d0f0058
eip=82ceab79 esp=8d0efee8 ebp=8d0f0024 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ExAcquireFastMutex+0x12:
82ceab79 f00fba3000      lock btr dword ptr [eax],0   ds:0023:00000018=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  1

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  00000001

EXCEPTION_PARAMETER2:  00000018

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82db5718
Unable to read MiSystemVaType memory at 82d95160
 00000018 

FOLLOWUP_IP: 
Ntfs!NtfsLookupNtfsMcbEntry+17
8b04f883 ff7510          push    dword ptr [ebp+10h]

FAULTING_IP: 
nt!ExAcquireFastMutex+12
82ceab79 f00fba3000      lock btr dword ptr [eax],0

BUGCHECK_STR:  0x24

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 8b04f883 to 82ceab79

STACK_TEXT:  
8d0efeec 8b04f883 8d0f0058 8633b500 863390d8 nt!ExAcquireFastMutex+0x12
8d0f0024 8b0c63fa 86431d58 8633b500 0000000d Ntfs!NtfsLookupNtfsMcbEntry+0x17
8d0f0068 8b0c54c4 86431d58 8633b500 0000000d Ntfs!LookupLcns+0x3a
8d0f01bc 8b0c4f99 86431d58 8633b500 86607be0 Ntfs!NtfsWriteLog+0x494
8d0f02b8 8b0dc042 86431d58 9844d930 8e626528 Ntfs!NtfsWriteFileSizes+0x3ec
8d0f0380 8b0e2cce 86431d58 8e626428 079bd0a8 Ntfs!NtOfsSetLength+0x41f
8d0f0420 8b0e75eb 86431d58 8e626518 079bd058 Ntfs!NtOfsPutData+0x4c
8d0f049c 8b0e435e 86431d58 97721500 9776bce8 Ntfs!NtfsWriteFcbUsnRecordToJournal+0xb2
8d0f04f8 8b0db1b7 86431d58 0608de16 86431d84 Ntfs!NtfsWriteUsnJournalChanges+0x1a8
8d0f0560 8b04eb92 86431d58 97721500 00000001 Ntfs!NtfsPostUsnChangeWithOverrideOption+0x491
8d0f0670 8b05085f 86431d58 86dd15f0 0608dd9e Ntfs!NtfsCommonWrite+0x19a9
8d0f06e8 82c894bc 86339020 86dd15f0 86dd15f0 Ntfs!NtfsFsdWrite+0x2e1
8d0f0700 8ae0620c 862e3130 86dd15f0 00000000 nt!IofCallDriver+0x63
8d0f0724 8ae063cb 8d0f0744 862e3130 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
8d0f075c 82c894bc 862e3130 86dd15f0 86dd15f0 fltmgr!FltpDispatch+0xc5
8d0f0774 82e8af6e 85ce2ad0 86dd15f0 86dd17c8 nt!IofCallDriver+0x63
8d0f0794 82e8b822 862e3130 85ce2ad0 00000001 nt!IopSynchronousServiceTail+0x1f8
8d0f0830 82c9044a 862e3130 8000024c 00000000 nt!NtWriteFile+0x6e8
8d0f0830 00000000 862e3130 8000024c 00000000 nt!KiFastCallEntry+0x12a


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsLookupNtfsMcbEntry+17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45

STACK_COMMAND:  .cxr 0xffffffff8d0efa00 ; kb

FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsLookupNtfsMcbEntry+17

BUCKET_ID:  0x24_Ntfs!NtfsLookupNtfsMcbEntry+17

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\102410-16130-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c1f000 PsLoadedModuleList = 0x82d67810
Debug session time: Sun Oct 24 08:53:45.618 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:00.662
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82c99276, 9c60b62c, 0}

Unable to load image \SystemRoot\system32\DRIVERS\MpFilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MpFilter.sys
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
Probably caused by : MpFilter.sys ( MpFilter+ec9c )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82c99276, The address that the exception occurred at
Arg3: 9c60b62c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MmUnlockPages+173
82c99276 8944242c        mov     dword ptr [esp+2Ch],eax

TRAP_FRAME:  9c60b62c -- (.trap 0xffffffff9c60b62c)
ErrCode = 00000002
eax=8641dbec ebx=8641dbc8 ecx=00000002 edx=00000fff esi=00000002 edi=8641dbe4
eip=82c99276 esp=9c60b6a0 ebp=9c60b6ec iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!MmUnlockPages+0x173:
82c99276 8944242c        mov     dword ptr [esp+2Ch],eax ss:0010:9c60b6cc=82eeb055
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82c87cd8 to 82c99276

STACK_TEXT:  
9c60b6ec 82c87cd8 8641dbc8 00000000 8781c488 nt!MmUnlockPages+0x173
9c60b728 8b025fd7 17624e50 90080f08 a2e15e50 nt!IopfCompleteRequest+0x2cd
9c60b7d0 9008bc9c 9c60b778 876a5274 a2e15e50 fltmgr!FltSendMessage+0x3b7
WARNING: Stack unwind information not available. Following frames may be wrong.
9c60b85c 90087bac 00000000 a2a45558 9c60b98c MpFilter+0xec9c
9c60b940 90087fdd 87958c38 9c60b98c 00000040 MpFilter+0xabac
9c60b968 8b020324 87958c38 9c60b98c 00000040 MpFilter+0xafdd
9c60b9d0 8b023512 00958bd8 87958bd8 1000000c fltmgr!FltpPerformPostCallbacks+0x24a
9c60b9e4 8b023b46 87958bd8 87c64738 9c60ba24 fltmgr!FltpProcessIoCompletion+0x10
9c60b9f4 8b02429c 86336778 87c64738 87958bd8 fltmgr!FltpPassThroughCompletion+0x98
9c60ba24 8b0378c9 9c60ba44 00000000 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x33a
9c60ba70 82c5b4bc 86336778 862e2008 879b2f0c fltmgr!FltpCreate+0x2db
9c60ba88 82e5f6ad ba49bab6 9c60bc30 00000000 nt!IofCallDriver+0x63
9c60bb60 82e4026b 862a0030 853df7a8 87760008 nt!IopParseDevice+0xed7
9c60bbdc 82e662d9 00000000 9c60bc30 00000040 nt!ObpLookupObjectName+0x4fa
9c60bc38 82e5e62b 00feec60 853df7a8 00000001 nt!ObOpenObjectByName+0x165
9c60bcb4 82e69f42 00feecbc 80100180 00feec60 nt!IopCreateFile+0x673
9c60bd00 82c6244a 00feecbc 80100180 00feec60 nt!NtCreateFile+0x34
9c60bd00 778664f4 00feecbc 80100180 00feec60 nt!KiFastCallEntry+0x12a
00feecc4 00000000 00000000 00000000 00000000 0x778664f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
MpFilter+ec9c
9008bc9c ??              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  MpFilter+ec9c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: MpFilter

IMAGE_NAME:  MpFilter.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ba4490e

FAILURE_BUCKET_ID:  0x8E_MpFilter+ec9c

BUCKET_ID:  0x8E_MpFilter+ec9c

Followup: MachineOwner





9007d000 900a0000   MpFilter T (no symbols)           
    Loaded symbol image file: MpFilter.sys
    Image path: \SystemRoot\system32\DRIVERS\MpFilter.sys
    Image name: MpFilter.sys
    Timestamp:        Sat Mar 20 06:03:26 2010 (4BA4490E)




9bd0c000 9bd38000   000      000.fcl      Fri Sep 26 16:11:12 2008 (48DCDF70)
833b4000 833fc000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
9013b000 90195000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
91400000 91412000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
9092c000 9093d000   amdppm   amdppm.sys   Tue Jul 14 02:11:03 2009 (4A5BBF07)
8afd6000 8afdf000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
8af07000 8af10000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
8af10000 8af33000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
8ae76000 8ae81000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
900a7000 900ae000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
908fd000 9090b000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
83240000 83248000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
9273d000 92756000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
98fd0000 98fee000   cdd      cdd.dll      unavailable (00000000)
9005e000 9007d000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8328a000 83335000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8b200000 8b225000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
83248000 8328a000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b22c000 8b289000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
8ae6e000 8ae76000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
91deb000 91df8000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
94397000 943a4000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
90881000 908e5000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
908e5000 908fd000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
90875000 90881000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b3e7000 8b3f8000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
9435d000 94376000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
943a4000 943ae000   dump_diskdump dump_diskdump.sys Tue Jul 14 02:45:49 2009 (4A5BC72D)
943e5000 943f6000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
943ae000 943e5000   dump_nvstor32 dump_nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
943f6000 94400000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
8fa67000 8fb1e000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
91db2000 91deb000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
9093d000 90948000   fdc      fdc.sys      Tue Jul 14 02:45:45 2009 (4A5BC729)
8b052000 8b063000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8fbf5000 8fbff000   flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
8b01e000 8b052000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b297000 8b2a0000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
8ae00000 8ae32000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
8b571000 8b5a2000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8302f000 83066000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
90800000 9081f000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
926b8000 9273d000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
8b410000 8b418000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
9096a000 90982000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
9098f000 9099c000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
80bb3000 80bbb000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
8fbb3000 8fbe7000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
8b1bd000 8b1d0000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b395000 8b3ba000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
92695000 926a5000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
9400b000 94026000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
83224000 8322f000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 02:13:13 2009 (4A5BBF89)
94000000 9400b000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
90982000 9098f000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8aef1000 8af07000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
9007d000 900a0000   MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
9e48c000 9e494e00   MpNWMon  MpNWMon.sys  Sat Mar 20 06:03:24 2010 (4BA4490C)
92756000 92768000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
92768000 9278b000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
9278b000 927c6000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
927c6000 927e1000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
90100000 9010b000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
83209000 83211000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8b192000 8b1bd000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
9086b000 90875000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b400000 8b410000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b2a0000 8b357000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
8fb36000 8fb41000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
8fb41000 8fb63000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
92649000 9265a000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
901ed000 901fb000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
90195000 901c7000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
8b357000 8b395000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
9010b000 90119000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
90861000 9086b000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
82c1f000 8302f000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
8b063000 8b192000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
900a0000 900a7000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
91db0000 91db1040   nvBridge nvBridge.kmd Fri Oct 08 09:50:24 2010 (4CAEBF30)
94376000 94397000   nvhda32v nvhda32v.sys Tue Sep 07 23:08:20 2010 (4C869BB4)
9141a000 91daf420   nvlddmkm nvlddmkm.sys Fri Oct 08 09:52:05 2010 (4CAEBF95)
8fa20000 8fa66700   nvm62x32 nvm62x32.sys Thu Nov 12 01:16:22 2009 (4AFB45C6)
8af33000 8af58000   nvstor   nvstor.sys   Wed May 20 09:44:09 2009 (4A13A6B9)
8af9f000 8afd6000   nvstor32 nvstor32.sys Wed Aug 05 03:27:05 2009 (4A78D1D9)
901ce000 901ed000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
90952000 9096a000   parport  parport.sys  Tue Jul 14 02:45:34 2009 (4A5BC71E)
8ae5d000 8ae6e000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
94026000 9402d000   parvdm   parvdm.sys   Tue Jul 14 02:45:29 2009 (4A5BC719)
8ae33000 8ae5d000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
8aedc000 8aee3000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
8aee3000 8aef1000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b289000 8b297000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
9bc3d000 9bcd4000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
9432e000 9435d000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
8322f000 83240000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8fb1e000 8fb36000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
8fb63000 8fb7b000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8fb7b000 8fb92000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
8fb92000 8fba9000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
90820000 90861000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8fba9000 8fbb3000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
900e8000 900f0000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
900f0000 900f8000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
900f8000 90100000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8b3ba000 8b3e7000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
926a5000 926b8000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
94032000 9432d2c0   RTKVHDA  RTKVHDA.sys  Tue Jul 06 13:02:40 2010 (4C32FF40)
92674000 92695000   SbieDrv  SbieDrv.sys  Mon Oct 18 01:40:57 2010 (4CBB7B79)
8b000000 8b00da60   SCDEmu   SCDEmu.SYS   Mon Apr 12 11:44:34 2010 (4BC2DD72)
9bcd4000 9bcde000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
90948000 90952000   serenum  serenum.sys  Tue Jul 14 02:45:27 2009 (4A5BC717)
8b1d0000 8b1ea000   serial   serial.sys   Tue Jul 14 02:45:33 2009 (4A5BC71D)
8b5ea000 8b5f2000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
9bd87000 9bdf1000   spsys    spsys.sys    Mon May 11 19:37:10 2009 (4A085436)
9e43b000 9e48c000   srv      srv.sys      Fri Aug 27 06:31:26 2010 (4C77318E)
9bd38000 9bd87000   srv2     srv2.sys     Fri Aug 27 06:30:45 2010 (4C773165)
9bcde000 9bcff000   srvnet   srvnet.sys   Fri Aug 27 06:30:39 2010 (4C77315F)
8af58000 8af9f000   storport storport.sys Tue Jul 14 02:45:58 2009 (4A5BC736)
91412000 91413380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
8b428000 8b571000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
9bcff000 9bd0c000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
90130000 9013b000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
90119000 90130000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8b1ea000 8b1fa000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
98fa0000 98fa9000   TSDDD    TSDDD.dll    Tue Jul 14 03:01:40 2009 (4A5BCAE4)
9090b000 9092c000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
8fbe7000 8fbf5000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
909f1000 90a00000   usbehci  usbehci.sys  Sat Oct 24 06:58:55 2009 (4AE27B7F)
92605000 92649000   usbhub   usbhub.sys   Sat Oct 24 07:00:05 2009 (4AE27BC5)
9099c000 909a6000   usbohci  usbohci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
909a6000 909f1000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
83211000 8321c000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
900ae000 900ba000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
900ba000 900db000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8b5a2000 8b5aa380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8ae81000 8ae91000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8ae91000 8aedc000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8b5ab000 8b5ea000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
90000000 90013000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
900db000 900e8000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
83335000 833a6000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
833a6000 833b4000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
901c7000 901ce000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
98d40000 98f8b000   win32k   win32k.sys   Wed Sep 01 05:34:29 2010 (4C7DBBB5)
83200000 83209000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
9265a000 92674000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)

Unloaded modules:
8b418000 8b425000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8b5f2000 8b5fc000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
90016000 9004d000   dump_nvstor3
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00037000
9004d000 9005e000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Back
Top