Thanks for attaching the DMP's!
From the attached DMP files, we seem to have two consistent bug checks:
PAGE_FAULT_IN_NONPAGED_AREA (50)
This indicates that invalid system memory has been referenced.
Bug check 0x50 usually occurs after the installation of faulty hardware or in the event of failure of installed hardware (usually related to defective RAM, be it main memory, L2 RAM cache, or video RAM).
Another common cause is the installation of a faulty system service.
Antivirus software can also trigger this error, as can a corrupted NTFS volume.
IRQL_NOT_LESS_OR_EQUAL (a)
This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
This bug check is issued if paged memory (or invalid memory) is accessed when the IRQL is too high. The error that generates this bug check usually occurs after the installation of a faulty device driver, system service, or BIOS.
--------------------------
In an *a dump from Oct 12th, if we have a look at the call stack:
Code:
2: kd> kv
Child-SP RetAddr : Args to Child : Call Site
fffff880`0805d668 fffff800`034be169 : 00000000`0000000a fffff804`034ddb30 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
fffff880`0805d670 fffff800`034bcde0 : fffff880`00000000 fffff880`0805d848 fffff880`0805d830 00000000`00000003 : nt!KiBugCheckDispatch+0x69
fffff880`0805d7b0 fffff800`034ddaee : fffffa80`085bfbd0 00000000`00000330 fffff880`0805d978 00000000`000007ff : nt!KiPageFault+0x260 (TrapFrame @ fffff880`0805d7b0)
fffff880`0805d940 fffff800`034c8a9a : fffff980`0ed43000 fffff880`0805daa0 fffffa80`0507a000 00000000`00000f80 : nt!KiIpiProcessRequests+0x19e
fffff880`0805da20 fffff800`036fbcb8 : fffffa80`0506c949 fffffa80`0507a000 fffff800`036fc3ac fffff980`0ed42000 : nt!KiIpiInterrupt+0x12a (TrapFrame @ fffff880`0805da20)
fffff880`0805dbb8 fffff800`036fbe12 : fffff980`0ed4297a fffffa80`0506c948 fffff980`0ed43000 00000000`00000000 : nt!LZNT1FindMatchStandard+0x10c
fffff880`0805dbe0 fffff800`036fc0b1 : fffff800`036fbbb0 00000000`0eab0000 00000000`000000ff fffffa80`0506bfdf : nt!LZNT1CompressChunk+0xe2
fffff880`0805dc70 fffff800`036fc424 : fffff8a0`00000ffc 00000000`00000000 00000000`00000000 fffff880`0805e2e0 : nt!RtlCompressBufferLZNT1+0x7d
fffff880`0805dce0 fffff880`0125bdac : 00000000`00000000 fffff880`0126b5bc 00000000`0eac0000 00000000`00000000 : nt!RtlCompressBuffer+0x64
fffff880`0805dd30 fffff880`0125c452 : fffff880`0805e2e0 fffff8a0`05fb0c70 00000000`0eac0000 fffff880`0805df80 : Ntfs!NtfsPrepareCompressedWriteBuffer+0x100
fffff880`0805dde0 fffff880`01265e99 : fffff880`0805dfd8 fffffa80`06f43010 fffff880`0805df00 00000000`0eac0000 : Ntfs!NtfsPrepareComplexBuffers+0x1ce
fffff880`0805deb0 fffff880`0126501c : fffffa80`06f43010 fffffa80`066a1500 fffff880`0805dfd0 00000000`0eab0000 : Ntfs!NtfsPrepareBuffers+0x179
fffff880`0805df30 fffff880`012692a2 : fffff880`0805e2e0 fffffa80`06f43010 00000000`00000000 fffff8a0`05fb0c70 : Ntfs!NtfsNonCachedIo+0x1bc
fffff880`0805e100 fffff880`01269e73 : fffff880`0805e2e0 fffffa80`06f43010 fffff880`0805e400 00000000`00100000 : Ntfs!NtfsCommonWrite+0x2d91
fffff880`0805e2b0 fffff880`01039bcf : fffffa80`06f433b0 fffffa80`06f43010 fffffa80`048eb1b0 00000000`00000000 : Ntfs!NtfsFsdWrite+0x1c3
fffff880`0805e530 fffff880`010386df : fffffa80`06e01de0 00000000`00000000 fffffa80`06e01d00 fffffa80`06f43010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0805e5c0 fffff880`0123d695 : fffffa80`06f43001 fffff800`03455c10 00000000`00000010 00000000`00000286 : fltmgr!FltpDispatch+0xcf
fffff880`0805e620 fffffa80`06f43001 : fffff800`03455c10 00000000`00000010 00000000`00000286 fffff880`0805e650 : [COLOR=#ff0000][U][I][B]MOBK+0x4695[/B][/I][/U][/COLOR]
fffff880`0805e628 fffff800`03455c10 : 00000000`00000010 00000000`00000286 fffff880`0805e650 00000000`00000018 : 0xfffffa80`06f43001
fffff880`0805e630 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAcquireSpinLockShared+0x24
We can see a
MOBK.sys (Change Monitor Filter driver) call before a few other NTFS related calls, and then the eventual bug check itself. With this said, I am going to recommend removing the Change Monitor software ASAP for troubleshooting purposes. If after removing it you're still crashing:
Remove and replace AVG with Microsoft Security Essentials for temporary troubleshooting purposes:
AVG removal tool - AVG | Download tools and utilities
MSE - Microsoft Security Essentials - Microsoft Windows
If after removing and replacing AVG as well you're still crashing, enable Driver Verifier to look for further device driver conflict and or corruption:
Driver Verifier:
What is Driver Verifier?
Driver Verifier is included in Windows 8, 7, Windows Server 2008 R2, Windows Vista, Windows Server 2008, Windows 2000, Windows XP, and Windows Server 2003 to promote stability and reliability; you can use this tool to troubleshoot driver issues. Windows kernel-mode components can cause system corruption or system failures as a result of an improperly written driver, such as an earlier version of a Windows Driver Model (WDM) driver.
Essentially, if there's a 3rd party driver believed to be at issue, enabling Driver Verifier will help flush out the rogue driver if it detects a violation.
Before enabling Driver Verifier, it is recommended to create a System Restore Point:
Vista - START | type rstrui - create a restore point
Windows 7 - START | type create | select "Create a Restore Point"
Windows 8 -
Restore Point - Create in Windows 8
How to enable Driver Verifier:
Start > type "verifier" without the quotes > Select the following options -
1. Select - "Create custom settings (for code developers)"
2. Select - "Select individual settings from a full list"
3. Check the following boxes -
- Special Pool
- Pool Tracking
- Force IRQL Checking
- Deadlock Detection
- Security Checks (Windows 7 & 8)
- DDI compliance checking (Windows 8)
- Miscellaneous Checks
4. Select - "Select driver names from a list"
5. Click on the "Provider" tab. This will sort all of the drivers by the provider.
6. Check EVERY box that is
NOT provided by Microsoft / Microsoft Corporation.
7. Click on Finish.
8. Restart.
Important information regarding Driver Verifier:
- If Driver Verifier finds a violation, the system will BSOD.
- After enabling Driver Verifier and restarting the system, depending on the culprit, if for example the driver is on start-up, you may not be able to get back into normal Windows because Driver Verifier will flag it, and as stated above, that will cause / force a BSOD.
If this happens, do
not panic, do the following:
- Boot into Safe Mode by repeatedly tapping the F8 key during boot-up.
- Once in Safe Mode - Start > type "system restore" without the quotes.
- Choose the restore point you created earlier.
If you did not set up a restore point, do not worry, you can still disable Driver Verifier to get back into normal Windows:
- Start > Search > type "cmd" without the quotes.
- To turn off Driver Verifier, type in cmd "verifier /reset" without the quotes.
・ Restart and boot into normal Windows.
How long should I keep Driver Verifier enabled for?
It varies, many experts and analysts have different recommendations. Personally, I recommend keeping it enabled for at least 24 hours. If you don't BSOD by then, disable Driver Verifier.
My system BSOD'd, where can I find the crash dumps?
They will be located in %systemroot%\Minidump
Any other questions can most likely be answered by this article:
Using Driver Verifier to identify issues with Windows drivers for advanced users
Regards,
Patrick