Problem Event Name: BlueScreen

Praetorian85

New member
Joined
Mar 7, 2013
Posts
2
Hi,

My PC has started bluescreen recently, most often when the PC has been off for a few days. It will BSOD a few times and then work fine after a while. Then I'll go away for the weekend or something and the problem is back, for a few hours.
I have added the attachments required from the BSOD Posting Instructions thread. View attachment Windows7_Vista_jcgriff2.rar
Windows is giving this error on reboot:


------------------------------
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7601.2.1.0.256.48
Locale ID: 2057

Additional information about the problem:
BCCode: 3b
BCP1: 00000000C0000005
BCP2: FFFFF8000375730E
BCP3: FFFFF88002151720
BCP4: 0000000000000000
OS Version: 6_1_7601
Service Pack: 1_0
Product: 256_1

Files that help describe the problem:
C:\Windows\Minidump\030613-26301-01.dmp
C:\Users\Luke\AppData\Local\Temp\WER-45599-0.sysdata.xml

Read our privacy statement online:
Windows 7 Privacy Statement - Microsoft Windows

If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
----------------


I am running Windows 7 Professional 64 bit, running on an AMD Phenom 2 quad core with 8GB of RAM (4x2GB sticks).
I have the two dump files available as noted above, but the forum suggested I don't upload those automatically.

I'm thinking possible memory problems, from the BSOD error message, so I have run Windows Memory Diagnostic Tool but I don't know where the results are? And probably don't know how to read the results either!

I have added the attachments required from the BSOD Posting Instructions thread. View attachment Windows7_Vista_jcgriff2.rar


Thanks for any help!
 
Recommendations:
I see a conflict between AVG and Spybot Search and Destroy on the system. I would recommend removing one or the other since they can't seem to play well together. If you remove AVG, make sure to replace it with another antivirus program such as Microsoft Security Essentials.

I personally avoid Spybot Search and Destroy due to its past reputation of causing more problems than it fixed. Not sure if the newest versions have that problem, but it is still software I avoid.



Please remove any CD/DVD virtualization software, such as Daemon Tools/Alcohol 120%, as they use a driver called sptd.sys that is known to cause BSODs. Use add/remove programs to remove the software. After removing the software, use the sptd.sys uninstaller to remove sptd.sys from the system by choosing to uninstall the software through the installer utility.


sptd.sys Fri Aug 19 22:34:53 2011 (4E4F396D)
SCSI Pass Through Direct Host - Daemon Tools (known BSOD issues with Win7)
http://www.carrona.org/drivers/driver.php?id=sptd.sys



3rd Party Drivers:
The following is for information purposes only. My recommendations were given above. The drivers that follow belong to software or devices that were not developed by Microsoft. Any drivers in red should be updated/replaced/removed. You can find links to the driver information and where to update the drivers in the section after the code box:
Code:
[font=lucida console]**************************Wed Mar  6 09:38:03.939 2013 (UTC - 7:00)**************************
lirsgt.sys                  Sat Mar  6 12:53:01 2004 (404A2C1D)
000.fcl                     Fri Sep 26 07:11:22 2008 (48DCDF7A)
atksgt.sys                  Mon Oct 20 01:50:38 2008 (48FC384E)
AtiPcie.sys                 Tue May  5 09:00:22 2009 (4A005486)
tap0901t.sys                Wed Sep 16 00:02:43 2009 (4AB07F83)
CLBUDF.SYS                  Wed Oct  7 00:42:23 2009 (4ACC384F)
CLBStor.sys                 Wed Oct  7 00:42:27 2009 (4ACC3853)
amdiox64.sys                Thu Feb 18 08:17:53 2010 (4B7D5A21)
amdxata.sys                 Fri Mar 19 10:18:18 2010 (4BA3A3CA)
rikvm_9EC60124.sys          Tue Oct  5 19:27:35 2010 (4CABD087)
a6ingj95.SYS                Tue Nov 16 11:51:16 2010 (4CE2D2A4)
nusb3hub.sys                Wed Feb  9 22:52:32 2011 (4D537D20)
nusb3xhc.sys                Wed Feb  9 22:52:33 2011 (4D537D21)
RTKVHD64.sys                Tue May  3 02:27:51 2011 (4DBFBC87)
Rt64win7.sys                Fri Jun 10 00:33:15 2011 (4DF1BAAB)
[COLOR=RED][B]sptd.sys                    Fri Aug 19 22:34:53 2011 (4E4F396D)[/B][/COLOR]
AODDriver2.sys              Thu Apr  5 03:23:37 2012 (4F7D6499)
avgrkx64.sys                Thu Sep 13 18:41:40 2012 (50527D44)
avgloga.sys                 Thu Sep 20 19:23:51 2012 (505BC1A7)
avgtdia.sys                 Thu Sep 20 19:25:33 2012 (505BC20D)
avgldx64.sys                Mon Oct  1 19:05:50 2012 (506A3DEE)
avgidsha.sys                Sun Oct 14 19:22:54 2012 (507B656E)
avgidsdrivera.sys           Mon Oct 22 04:47:11 2012 (5085242F)
AtihdW76.sys                Tue Nov  6 14:41:51 2012 (5099841F)
avgmfx64.sys                Thu Nov 15 15:03:50 2012 (50A566C6)
atikmpag.sys                Wed Dec 19 12:32:55 2012 (50D21667)
atikmdag.sys                Wed Dec 19 13:38:55 2012 (50D225DF)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar  6 08:50:52.001 2013 (UTC - 7:00)**************************
aoikblkb.SYS                Tue Nov 16 11:51:16 2010 (4CE2D2A4)
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar  6 08:45:39.189 2013 (UTC - 7:00)**************************
afv5irnr.SYS                Tue Nov 16 11:51:16 2010 (4CE2D2A4)
[/font]
http://www.carrona.org/drivers/driver.php?id=lirsgt.sys
http://www.carrona.org/drivers/driver.php?id=000.fcl
http://www.carrona.org/drivers/driver.php?id=atksgt.sys
http://www.carrona.org/drivers/driver.php?id=AtiPcie.sys
http://www.carrona.org/drivers/driver.php?id=tap0901t.sys
http://www.carrona.org/drivers/driver.php?id=CLBUDF.SYS
http://www.carrona.org/drivers/driver.php?id=CLBStor.sys
http://www.carrona.org/drivers/driver.php?id=amdiox64.sys
http://www.carrona.org/drivers/driver.php?id=amdxata.sys
http://www.carrona.org/drivers/driver.php?id=rikvm_9EC60124.sys
a6ingj95.SYS - this driver hasn't been added to the DRT as of this run. Please search Google/Bing for the driver if additional information is needed.
http://www.carrona.org/drivers/driver.php?id=nusb3hub.sys
http://www.carrona.org/drivers/driver.php?id=nusb3xhc.sys
http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
http://www.carrona.org/drivers/driver.php?id=Rt64win7.sys
http://www.carrona.org/drivers/driver.php?id=sptd.sys
http://www.carrona.org/drivers/driver.php?id=AODDriver2.sys
http://www.carrona.org/drivers/driver.php?id=avgrkx64.sys
http://www.carrona.org/drivers/driver.php?id=avgloga.sys
http://www.carrona.org/drivers/driver.php?id=avgtdia.sys
http://www.carrona.org/drivers/driver.php?id=avgldx64.sys
http://www.carrona.org/drivers/driver.php?id=avgidsha.sys
http://www.carrona.org/drivers/driver.php?id=avgidsdrivera.sys
http://www.carrona.org/drivers/driver.php?id=AtihdW76.sys
http://www.carrona.org/drivers/driver.php?id=avgmfx64.sys
http://www.carrona.org/drivers/driver.php?id=atikmpag.sys
http://www.carrona.org/drivers/driver.php?id=atikmdag.sys
aoikblkb.SYS - this driver hasn't been added to the DRT as of this run. Please search Google/Bing for the driver if additional information is needed.
afv5irnr.SYS - this driver hasn't been added to the DRT as of this run. Please search Google/Bing for the driver if additional information is needed.



Analysis:
The following is for information purposes only. The following information contains the relevant information from the blue screen analysis:
Code:
[font=lucida console]**************************Wed Mar  6 09:38:03.939 2013 (UTC - 7:00)**************************
Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-26301-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Built by: [B]7601[/B].18044.amd64fre.win7sp1_gdr.130104-1431
System Uptime:[B]0 days 0:30:32.651[/B]
Probably caused by :[B]ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1de )[/B]
BugCheck [B]3B, {c0000005, fffff8000375730e, fffff88002151720, 0}[/B]
BugCheck Info: [url=http://www.carrona.org/bsodindx.html#0x0000003B]SYSTEM_SERVICE_EXCEPTION (3b)[/url]
Arguments: 
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000375730e, Address of the instruction which caused the bugcheck
Arg3: fffff88002151720, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
BUGCHECK_STR:  0x3B
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  SDUpdate.exe
FAILURE_BUCKET_ID: [B]X64_0x3B_nt!CmpKcbCacheLookup+1de[/B]
  BIOS Version                  V17.13
  BIOS Release Date             06/29/2011
  Manufacturer                  MSI
  Product Name                  MS-7599
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar  6 08:50:52.001 2013 (UTC - 7:00)**************************
Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-27705-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Built by: [B]7601[/B].18044.amd64fre.win7sp1_gdr.130104-1431
System Uptime:[B]0 days 0:03:49.578[/B]
Probably caused by :[B]Pool_Corruption ( nt!ExDeferredFreePool+257 )[/B]
BugCheck [B]3B, {c0000005, fffff800035b0b13, fffff88009907000, 0}[/B]
BugCheck Info: [url=http://www.carrona.org/bsodindx.html#0x0000003B]SYSTEM_SERVICE_EXCEPTION (3b)[/url]
Arguments: 
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800035b0b13, Address of the instruction which caused the bugcheck
Arg3: fffff88009907000, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
BUGCHECK_STR:  0x3B
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  SDWSCSvc.exe
FAILURE_BUCKET_ID: [B]X64_0x3B_nt!ExDeferredFreePool+257[/B]
  BIOS Version                  V17.13
  BIOS Release Date             06/29/2011
  Manufacturer                  MSI
  Product Name                  MS-7599
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
**************************Wed Mar  6 08:45:39.189 2013 (UTC - 7:00)**************************
Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-30248-01.dmp]
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Built by: [B]7601[/B].18044.amd64fre.win7sp1_gdr.130104-1431
System Uptime:[B]0 days 0:03:51.391[/B]
Probably caused by :[B]ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1de )[/B]
BugCheck [B]3B, {c0000005, fffff8000375930e, fffff8800bf58720, 0}[/B]
BugCheck Info: [url=http://www.carrona.org/bsodindx.html#0x0000003B]SYSTEM_SERVICE_EXCEPTION (3b)[/url]
Arguments: 
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000375930e, Address of the instruction which caused the bugcheck
Arg3: fffff8800bf58720, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
BUGCHECK_STR:  0x3B
DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
PROCESS_NAME:  chrome.exe
FAILURE_BUCKET_ID: [B]X64_0x3B_nt!CmpKcbCacheLookup+1de[/B]
  BIOS Version                  V17.13
  BIOS Release Date             06/29/2011
  Manufacturer                  MSI
  Product Name                  MS-7599
¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
[/font]

Code:
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\8713\kdc\outkdOutput1.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-26301-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18044.amd64fre.win7sp1_gdr.130104-1431
Machine Name:
Kernel base = 0xfffff800`03412000 PsLoadedModuleList = 0xfffff800`03656670
Debug session time: Wed Mar  6 09:38:03.939 2013 (UTC - 7:00)
System Uptime: 0 days 0:30:32.651
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000375730e, fffff88002151720, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1de )

Followup: MachineOwner
---------

1: kd> !niemiro.rawstack; q
0xfffff880`02150068  0xfffff800`034c7772 nt!flsbuf+0xfe
0xfffff880`02150098  0xfffff800`034c760d nt!output_l+0x6e1
0xfffff880`021500a0  0xfffff880`06d80110 crashdmp!StrBeginningDump+0x0
0xfffff880`02150108  0xfffff800`039fb524 hal!HalpDmaMapScatterTransfer+0x34
0xfffff880`02150128  0xfffff800`034c760d nt!output_l+0x6e1
0xfffff880`02150148  0xfffff800`039fbe08 hal!HalpDmaSyncMapBuffers+0x1b0
0xfffff880`02150168  0xfffff880`06d89b44 dump_dumpata!IdeDumpNotification+0x1ec
0xfffff880`02150198  0xfffff880`06d89b44 dump_dumpata!IdeDumpNotification+0x1ec
0xfffff880`021501b8  0xfffff880`06d89b00 dump_dumpata!IdeDumpNotification+0x1a8
0xfffff880`021501f8  0xfffff800`039fb593 hal!HalpDmaMapScatterTransfer+0xa3
0xfffff880`02150228  0xfffff880`06d8aa01 dump_dumpata!AtaPortRequestCallback+0x2d
0xfffff880`02150248  0xfffff800`039fe4fb hal!HalpMapTransfer+0x7b
0xfffff880`02150268  0xfffff880`06d965c9 dump_atapi!AtapiProgramTaskFile+0x75
0xfffff880`02150298  0xfffff880`06d9617a dump_atapi!AtapiSendAtaCommand+0x15e
0xfffff880`021502d8  0xfffff800`039fe472 hal!IoMapTransfer+0x8e
0xfffff880`02150308  0xfffff800`039fe801 hal!IoFlushAdapterBuffers+0x71
0xfffff880`02150318  0xfffff880`06d8a31e dump_dumpata!IdeDumpAllocateScatterGatherList+0x9a
0xfffff880`02150348  0xfffff880`06d8a401 dump_dumpata!IdeDumpFreeScatterGatherList+0x9d
0xfffff880`02150368  0xfffff880`06d89781 dump_dumpata!DispatchCrb+0xb9
0xfffff880`02150388  0xfffff880`06d8993f dump_dumpata!IdeDumpCompletionDpc+0xef
0xfffff880`021503b8  0xfffff880`06d89dc9 dump_dumpata!IdeDumpSetupWriteCrb+0x39
0xfffff880`021503c8  0xfffff880`06d7d440 crashdmp!IsBufferValid+0x28
0xfffff880`021503d8  0xfffff880`06d7cf7a crashdmp!FilterCallback+0xae
0xfffff880`021503e8  0xfffff880`06d894ce dump_dumpata!IdeDumpWritePending+0xd6
0xfffff880`02150438  0xfffff880`06d7cd76 crashdmp!CrashdmpWriteRoutine+0x4a
0xfffff880`02150468  0xfffff880`06d7bf48 crashdmp!WritePageSpanToDisk+0x180
0xfffff880`02150478  0xfffff880`06d80370 crashdmp!Context+0x30
0xfffff880`02150570  0xfffff880`06d80370 crashdmp!Context+0x30
0xfffff880`02150598  0xfffff880`06d7bc95 crashdmp!WriteKernelDump+0x12d
0xfffff880`021505a0  0xfffff880`06d7cd2c crashdmp!CrashdmpWriteRoutine+0x0
0xfffff880`021505c0  0xfffff800`036892c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`021505e8  0xfffff880`06d7bac5 crashdmp!DumpWrite+0x145
0xfffff880`021505f8  0xfffff880`06d80370 crashdmp!Context+0x30
0xfffff880`02150618  0xfffff880`06d7b187 crashdmp!CrashdmpWrite+0x57
0xfffff880`02150638  0xfffff880`06d80a30 crashdmp!ContextCopy+0x0
0xfffff880`02150640  0xfffff800`036892c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`02150648  0xfffff800`03578a31 nt!IoWriteCrashDump+0x391
0xfffff880`021506d0  0xfffff800`0368cfe0 nt!IopTriageDumpDataBlocks+0x0
0xfffff880`021506d8  0xfffff800`036892c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`021506e0  0xfffff800`036892c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`02150710  0xfffff800`0353a9d0 nt!IoSetDumpRange+0x0
0xfffff880`02150718  0xfffff800`0353a920 nt!IoFreeDumpRange+0x0
0xfffff880`02150720  0xfffff800`036c0a40 nt!KiProcessorBlock+0x0
0xfffff880`02150740  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02150748  0xfffff800`03579d96 nt!KeBugCheck2+0xac6
0xfffff880`02150910  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02150928  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02150938  0xfffff800`0375730e nt!CmpKcbCacheLookup+0x1de
0xfffff880`02150958  0xfffff800`03486ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`02150960  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`02150968  0xfffff800`03486ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`02150978  0xfffff800`03487c40 nt!KeBugCheckEx+0x0
0xfffff880`02150d58  0xfffff880`00ff05c9 atapi!AtapiProgramTaskFile+0x75
0xfffff880`02150d88  0xfffff880`00ff017a atapi!AtapiSendAtaCommand+0x15e
0xfffff880`02150db8  0xfffff880`012eaebd Ntfs!TxfAccessCheck+0x32d
0xfffff880`02150dc8  0xfffff800`03794540 nt!SeAuditingAnyFileEventsWithContext+0x50
0xfffff880`02150de0  0xfffff800`03486ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`02150de8  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`02150df0  0xfffff800`03486ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`02150e00  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02150e10  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02150e18  0xfffff800`03487d44 nt!KeBugCheckEx+0x104
0xfffff880`02150e58  0xfffff800`034871e9 nt!KiBugCheckDispatch+0x69
0xfffff880`02150e70  0xfffff800`0375730e nt!CmpKcbCacheLookup+0x1de
0xfffff880`02150f48  0xfffff800`037380b5 nt!FsRtlRemoveExtraCreateParameter+0x49
0xfffff880`02150f60  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02150f70  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02150f78  0xfffff800`03486ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`02150f80  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`02150f88  0xfffff800`03486ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`02150f98  0xfffff800`03486b3c nt!KiSystemServiceHandler+0x7c
0xfffff880`02150fb8  0xfffff800`034b2d40 nt!_C_specific_handler+0x0
0xfffff880`02150fc0  0xfffff800`036aa244 nt!BBTBuffer <PERF> (nt+0x298244)+0x0
0xfffff880`02150fc8  0xfffff800`0375975c nt!CmOpenKey+0x28a
0xfffff880`02150fd8  0xfffff800`034b284d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`02150fe0  0xfffff800`036aa334 nt!BBTBuffer <PERF> (nt+0x298334)+0x0
0xfffff880`02150fe8  0xfffff800`035cf640 nt!_imp_NtOpenSymbolicLinkObject+0x138
0xfffff880`02150ff0  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151008  0xfffff800`034b1625 nt!RtlDispatchException+0x415
0xfffff880`02151010  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02151028  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151058  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151060  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02151078  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`021510a0  0xfffff800`03486ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`021510a8  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`021510b0  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`021510d0  0xfffff800`03486ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`021510d8  0xfffff800`035d8694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`02151108  0xfffff880`012d3e5c Ntfs!NtfsCheckExistingFile+0x1dc
0xfffff880`02151158  0xfffff880`012cfe1f Ntfs!NtfsOpenAttributeInExistingFile+0x50f
0xfffff880`021511f8  0xfffff800`034995a8 nt!SeAccessCheckWithHint+0x178
0xfffff880`02151238  0xfffff800`0377f590 nt!IopFileMapping+0x0
0xfffff880`021512a8  0xfffff880`012e4866 Ntfs!NtfsFindPrefixHashEntry+0x4ad
0xfffff880`021512c0  0xfffff880`01281a00 Ntfs!NtfsFileNameIndex+0x0
0xfffff880`021512e8  0xfffff880`012d3680 Ntfs!NtfsOpenExistingPrefixFcb+0x74b
0xfffff880`021513a8  0xfffff880`012e4866 Ntfs!NtfsFindPrefixHashEntry+0x4ad
0xfffff880`021513e8  0xfffff880`012d3680 Ntfs!NtfsOpenExistingPrefixFcb+0x74b
0xfffff880`021514d8  0xfffff880`012e31f6 Ntfs!NtfsFindStartingNode+0x5e6
0xfffff880`02151518  0xfffff880`0124a293 Ntfs!NtfsAcquireExclusiveFcb+0x73
0xfffff880`02151568  0xfffff880`012df313 Ntfs!NtfsCommonCleanup+0x5892
0xfffff880`021515a8  0xfffff880`012e277c Ntfs!NtfsCommonCreate+0x21b5
0xfffff880`021515c8  0xfffff800`03486c40 nt!KiSystemCall64+0x0
0xfffff880`021515d0  0xfffff800`03786ecb nt!ObOpenObjectByName+0x53b
0xfffff880`021515d8  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`021515e0  0xfffff800`036aa07c nt!BBTBuffer <PERF> (nt+0x29807c)+0x0
0xfffff880`021515e8  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`021515f0  0xfffff800`036aa0c4 nt!BBTBuffer <PERF> (nt+0x2980c4)+0x0
0xfffff880`021515f8  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151600  0xfffff800`036a9f5c nt!BBTBuffer <PERF> (nt+0x297f5c)+0x0
0xfffff880`02151608  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151610  0xfffff800`036ab708 nt!BBTBuffer <PERF> (nt+0x299708)+0x0
0xfffff880`02151618  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151620  0xfffff800`036ab7b0 nt!BBTBuffer <PERF> (nt+0x2997b0)+0x0
0xfffff880`02151628  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151630  0xfffff800`036aa244 nt!BBTBuffer <PERF> (nt+0x298244)+0x0
0xfffff880`02151638  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151640  0xfffff800`036aa334 nt!BBTBuffer <PERF> (nt+0x298334)+0x0
0xfffff880`02151648  0xfffff800`03412000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`02151650  0xfffff800`03696b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`02151658  0xfffff800`034c23a7 nt!KiPreprocessFault+0x53
0xfffff880`02151668  0xfffff800`03499c00 nt!SepNormalAccessCheck+0xb0
0xfffff880`02151680  0xfffff800`0375730e nt!CmpKcbCacheLookup+0x1de
0xfffff880`02151688  0xfffff800`03757310 nt!CmpKcbCacheLookup+0x1e0
0xfffff880`021516a0  0xfffff800`0375730f nt!CmpKcbCacheLookup+0x1df
0xfffff880`021516e8  0xfffff800`034c25b1 nt!KiDispatchException+0x135
0xfffff880`02151778  0xfffff800`034bc7ea nt!MiMapProcessMetaPage+0x2fa
0xfffff880`02151818  0xfffff800`0375730e nt!CmpKcbCacheLookup+0x1de
0xfffff880`02151828  0xfffff800`034995a8 nt!SeAccessCheckWithHint+0x178
0xfffff880`02151868  0xfffff800`0377f590 nt!IopFileMapping+0x0
0xfffff880`021519d8  0xfffff880`00c042ec fltmgr!FltpPerformPostCallbacks+0x3cc
0xfffff880`02151a38  0xfffff800`03794540 nt!SeAuditingAnyFileEventsWithContext+0x50
0xfffff880`02151a68  0xfffff800`037828a6 nt!SeUnlockSubjectContext+0x16
0xfffff880`02151a98  0xfffff880`012e7006 Ntfs!NtfsAccessCheck+0xf85
0xfffff880`02151ae8  0xfffff800`0377f590 nt!IopFileMapping+0x0
0xfffff880`02151af8  0xfffff800`0349f991 nt!FsRtlCheckOplockEx+0x5b1
0xfffff880`02151bb8  0xfffff800`034af4c5 nt!RtlGetExtendedContextLength+0x19
0xfffff880`02151d08  0xfffff880`012d4065 Ntfs!NtfsOpenExistingAttr+0x145
0xfffff880`02151d88  0xfffff800`034872c2 nt!KiExceptionDispatch+0xc2
0xfffff880`02151e68  0xfffff880`00e36000 fileinfo!FILockInitialize+0xfffffffffffffff8
0xfffff880`02151ed8  0xfffff800`0375730e nt!CmpKcbCacheLookup+0x1de
0xfffff880`02151f18  0xfffff880`012e4866 Ntfs!NtfsFindPrefixHashEntry+0x4ad
0xfffff880`02151f58  0xfffff880`012d3680 Ntfs!NtfsOpenExistingPrefixFcb+0x74b
0xfffff880`02151f68  0xfffff800`03485bca nt!KiGeneralProtectionFault+0x10a
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\8713\kdc\outkdOutput2.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-27705-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18044.amd64fre.win7sp1_gdr.130104-1431
Machine Name:
Kernel base = 0xfffff800`03405000 PsLoadedModuleList = 0xfffff800`03649670
Debug session time: Wed Mar  6 08:50:52.001 2013 (UTC - 7:00)
System Uptime: 0 days 0:03:49.578
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800035b0b13, fffff88009907000, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+257 )

Followup: Pool_corruption
---------

1: kd> !niemiro.rawstack; q
0xfffff880`09906000  0xfffff800`036b3a40 nt!KiProcessorBlock+0x0
0xfffff880`09906020  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906028  0xfffff800`0356cd96 nt!KeBugCheck2+0xac6
0xfffff880`09906108  0xfffff880`012cae5c Ntfs!NtfsCheckExistingFile+0x1dc
0xfffff880`09906158  0xfffff880`012c6e1f Ntfs!NtfsOpenAttributeInExistingFile+0x50f
0xfffff880`099061f0  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`09906208  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906218  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09906238  0xfffff800`03479ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`09906240  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`09906248  0xfffff800`03479ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`09906258  0xfffff800`0347ac40 nt!KeBugCheckEx+0x0
0xfffff880`09906668  0xfffff800`0348ccde nt!SepNormalAccessCheck+0x18e
0xfffff880`099066c0  0xfffff800`03479ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`099066c8  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`099066d0  0xfffff800`03479ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`099066e0  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`099066f0  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`099066f8  0xfffff800`0347ad44 nt!KeBugCheckEx+0x104
0xfffff880`09906738  0xfffff800`0347a1e9 nt!KiBugCheckDispatch+0x69
0xfffff880`09906750  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09906828  0xfffff800`0348c5a8 nt!SeAccessCheckWithHint+0x178
0xfffff880`09906840  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`09906850  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906858  0xfffff800`03479ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`09906860  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`09906868  0xfffff800`03479ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`09906878  0xfffff800`03479b3c nt!KiSystemServiceHandler+0x7c
0xfffff880`099068a8  0xfffff800`034a5b80 nt!RtlpGetStackLimits+0x14
0xfffff880`099068b8  0xfffff800`034a584d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`099068c0  0xfffff800`0369b714 nt!BBTBuffer <PERF> (nt+0x296714)+0x0
0xfffff880`099068c8  0xfffff800`035d7c68 nt!_imp_NtOpenSymbolicLinkObject+0x15760
0xfffff880`099068d0  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`099068e8  0xfffff800`034a4625 nt!RtlDispatchException+0x415
0xfffff880`099068f0  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`09906908  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906928  0xfffff880`012e1ebd Ntfs!TxfAccessCheck+0x32d
0xfffff880`09906938  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906940  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`09906958  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`09906980  0xfffff800`03479ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`09906988  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906990  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`099069b0  0xfffff800`03479ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`099069b8  0xfffff800`035cb694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`099069d8  0xfffff880`00da52ec fltmgr!FltpPerformPostCallbacks+0x3cc
0xfffff880`09906a38  0xfffff800`03787540 nt!SeAuditingAnyFileEventsWithContext+0x50
0xfffff880`09906a98  0xfffff880`012de006 Ntfs!NtfsAccessCheck+0xf85
0xfffff880`09906b08  0xfffff880`012d6300 Ntfs!NtfsCommonCleanup+0x587f
0xfffff880`09906b58  0xfffff800`0348d305 nt!MiUpdateWsle+0x3f5
0xfffff880`09906d08  0xfffff880`012cb065 Ntfs!NtfsOpenExistingAttr+0x145
0xfffff880`09906dc8  0xfffff880`012c6ebb Ntfs!NtfsOpenAttributeInExistingFile+0x5ab
0xfffff880`09906e38  0xfffff880`012cf897 Ntfs!NtfsCommonClose+0x9c4
0xfffff880`09906e68  0xfffff880`00e90000 fileinfo!FILockInitialize+0xfffffffffffffff8
0xfffff880`09906ea8  0xfffff800`03479c40 nt!KiSystemCall64+0x0
0xfffff880`09906eb0  0xfffff800`03751eb4 nt!AlpcpCreateSecurityContext+0x0
0xfffff880`09906eb8  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906ec0  0xfffff800`036971cc nt!BBTBuffer <PERF> (nt+0x2921cc)+0x0
0xfffff880`09906ec8  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906ed0  0xfffff800`03697184 nt!BBTBuffer <PERF> (nt+0x292184)+0x0
0xfffff880`09906ed8  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906ee0  0xfffff800`0368a224 nt!BBTBuffer <PERF> (nt+0x285224)+0x0
0xfffff880`09906ee8  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906ef0  0xfffff800`0369d52c nt!BBTBuffer <PERF> (nt+0x29852c)+0x0
0xfffff880`09906ef8  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906f00  0xfffff800`0369b714 nt!BBTBuffer <PERF> (nt+0x296714)+0x0
0xfffff880`09906f08  0xfffff800`03405000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`09906f10  0xfffff800`03689b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`09906f18  0xfffff880`012db866 Ntfs!NtfsFindPrefixHashEntry+0x4ad
0xfffff880`09906f38  0xfffff800`034b53a7 nt!KiPreprocessFault+0x53
0xfffff880`09906f58  0xfffff880`012ca680 Ntfs!NtfsOpenExistingPrefixFcb+0x74b
0xfffff880`09906f60  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09906f68  0xfffff800`035b0b15 nt!ExDeferredFreePool+0x259
0xfffff880`09906f80  0xfffff800`035b0b14 nt!ExDeferredFreePool+0x258
0xfffff880`09906fc8  0xfffff800`034b55b1 nt!KiDispatchException+0x135
0xfffff880`099070f8  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09907138  0xfffff880`012d6300 Ntfs!NtfsCommonCleanup+0x587f
0xfffff880`09907188  0xfffff800`0348d305 nt!MiUpdateWsle+0x3f5
0xfffff880`09907308  0xfffff800`035afe80 nt!ExAllocatePoolWithTag+0x270
0xfffff880`09907338  0xfffff800`0378c50e nt!RtlpInheritAcl2+0x18e
0xfffff880`09907378  0xfffff800`035afe80 nt!ExAllocatePoolWithTag+0x270
Unable to load image \SystemRoot\system32\DRIVERS\avgidsdrivera.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgidsdrivera.sys
*** ERROR: Module load completed but symbols could not be loaded for avgidsdrivera.sys
0xfffff880`09907390  0xfffff880`041ec100 avgidsdrivera!+0x25100
0xfffff880`099073d8  0xfffff800`035afe80 nt!ExAllocatePoolWithTag+0x270
0xfffff880`099073f8  0xfffff800`0378f3c2 nt!RtlpInheritAcl+0x182
0xfffff880`09907418  0xfffff800`035af30d nt!ExFreePoolWithTag+0x22d
0xfffff880`09907488  0xfffff800`0346a8e6 nt!RtlSidDominates+0xb6
0xfffff880`09907498  0xfffff800`034a24c5 nt!RtlGetExtendedContextLength+0x19
0xfffff880`099075f8  0xfffff800`0347df53 nt!SwapContext_PatchXSave+0xa3
0xfffff880`09907638  0xfffff800`0347db8a nt!KiSwapContext+0x7a
0xfffff880`09907668  0xfffff800`0347a2c2 nt!KiExceptionDispatch+0xc2
0xfffff880`099077b8  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09907808  0xfffff800`03481a9f nt!KeWaitForSingleObject+0x19f
0xfffff880`09907848  0xfffff800`03478bca nt!KiGeneralProtectionFault+0x10a
0xfffff880`09907940  0xfffff800`035f4e98 nt!AlpcMessageType+0x0
0xfffff880`09907948  0xfffff800`0378ae77 nt!AlpcpMessageDestroyProcedure+0x67
0xfffff880`09907988  0xfffff800`0378afc8 nt!AlpcpDestroyBlob+0x28
0xfffff880`099079a0  0xfffff800`035f4e98 nt!AlpcMessageType+0x0
0xfffff880`099079b8  0xfffff800`035b0b13 nt!ExDeferredFreePool+0x257
0xfffff880`09907a68  0xfffff800`035af4f1 nt!ExFreePoolWithTag+0x411
0xfffff880`09907a98  0xfffff800`037340fe nt!PsReturnSharedPoolQuota+0x3e
0xfffff880`09907ac8  0xfffff800`03774fc6 nt!ObpFreeObject+0x266
0xfffff880`09907ae0  0xfffff800`035f4d30 nt!AlpcpRegisteredTypes+0x0
0xfffff880`09907b18  0xfffff800`0348417c nt!ObfDereferenceObject+0xdc
0xfffff880`09907b78  0xfffff800`03751e0e nt!AlpcpSecurityDestroyProcedure+0x10e
0xfffff880`09907ba8  0xfffff800`0371eebd nt!NtAlpcDeleteSecurityContext+0x151
0xfffff880`09907bb8  0xfffff800`035f4d80 nt!AlpcSecurityType+0x0
0xfffff880`09907c18  0xfffff800`03479ed3 nt!KiSystemServiceCopyEnd+0x13
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\8713\kdc\outkdOutput3.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_07\Praetorian85\Windows7_Vista_jcgriff2\030613-30248-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18044.amd64fre.win7sp1_gdr.130104-1431
Machine Name:
Kernel base = 0xfffff800`03414000 PsLoadedModuleList = 0xfffff800`03658670
Debug session time: Wed Mar  6 08:45:39.189 2013 (UTC - 7:00)
System Uptime: 0 days 0:03:51.391
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000375930e, fffff8800bf58720, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1de )

Followup: MachineOwner
---------

1: kd> !niemiro.rawstack; q
0xfffff880`0bf57068  0xfffff800`034c9772 nt!flsbuf+0xfe
0xfffff880`0bf57098  0xfffff800`034c960d nt!output_l+0x6e1
0xfffff880`0bf570a0  0xfffff880`06c34110 crashdmp!StrBeginningDump+0x0
0xfffff880`0bf57108  0xfffff800`039fd524 hal!HalpDmaMapScatterTransfer+0x34
0xfffff880`0bf57128  0xfffff800`034c960d nt!output_l+0x6e1
0xfffff880`0bf57148  0xfffff880`06c3db44 dump_dumpata!IdeDumpNotification+0x1ec
0xfffff880`0bf57168  0xfffff880`06c3db44 dump_dumpata!IdeDumpNotification+0x1ec
0xfffff880`0bf57198  0xfffff880`06c3db44 dump_dumpata!IdeDumpNotification+0x1ec
0xfffff880`0bf571b8  0xfffff880`06c3db00 dump_dumpata!IdeDumpNotification+0x1a8
0xfffff880`0bf571d8  0xfffff880`06c3e9c4 dump_dumpata!AtaPortGetPhysicalAddress+0x2c
0xfffff880`0bf571f8  0xfffff800`039fd524 hal!HalpDmaMapScatterTransfer+0x34
0xfffff880`0bf57228  0xfffff880`06c3eab1 dump_dumpata!AtaPortCompleteRequest+0x21
0xfffff880`0bf57248  0xfffff880`06c4a6d4 dump_atapi!AtapiSetupPrdTable+0xf4
0xfffff880`0bf57268  0xfffff880`06c4a5c9 dump_atapi!AtapiProgramTaskFile+0x75
0xfffff880`0bf57298  0xfffff880`06c4a17a dump_atapi!AtapiSendAtaCommand+0x15e
0xfffff880`0bf572c8  0xfffff880`06c4a01c dump_atapi!AtapiSendAtaCommand+0x0
0xfffff880`0bf572d8  0xfffff800`03a00472 hal!IoMapTransfer+0x8e
0xfffff880`0bf57308  0xfffff880`06c49ee1 dump_atapi!AtapiHandleAtaCommand+0x45
0xfffff880`0bf57328  0xfffff800`03a0b280 hal!HalpTscStallExecutionProcessor+0x7c
0xfffff880`0bf57338  0xfffff880`06c49656 dump_atapi!AtapiHwStartIo+0x66
0xfffff880`0bf57348  0xfffff880`06c3e401 dump_dumpata!IdeDumpFreeScatterGatherList+0x9d
0xfffff880`0bf57368  0xfffff880`06c3d82b dump_dumpata!DispatchCrb+0x163
0xfffff880`0bf57388  0xfffff800`03a0aa7b hal!KeStallExecutionProcessor+0x183
0xfffff880`0bf573b8  0xfffff880`06c3e49d dump_dumpata!IdeDumpWaitOnRequest+0x49
0xfffff880`0bf573c8  0xfffff880`06c31440 crashdmp!IsBufferValid+0x28
0xfffff880`0bf573d8  0xfffff880`06c30f7a crashdmp!FilterCallback+0xae
0xfffff880`0bf573e8  0xfffff880`06c3d4e6 dump_dumpata!IdeDumpWritePending+0xee
0xfffff880`0bf57438  0xfffff880`06c30d76 crashdmp!CrashdmpWriteRoutine+0x4a
0xfffff880`0bf57468  0xfffff880`06c2ff48 crashdmp!WritePageSpanToDisk+0x180
0xfffff880`0bf57478  0xfffff880`06c34370 crashdmp!Context+0x30
0xfffff880`0bf57570  0xfffff880`06c34370 crashdmp!Context+0x30
0xfffff880`0bf57598  0xfffff880`06c2fc95 crashdmp!WriteKernelDump+0x12d
0xfffff880`0bf575a0  0xfffff880`06c30d2c crashdmp!CrashdmpWriteRoutine+0x0
0xfffff880`0bf575c0  0xfffff800`0368b2c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`0bf575e8  0xfffff880`06c2fac5 crashdmp!DumpWrite+0x145
0xfffff880`0bf575f8  0xfffff880`06c34370 crashdmp!Context+0x30
0xfffff880`0bf57618  0xfffff880`06c2f187 crashdmp!CrashdmpWrite+0x57
0xfffff880`0bf57638  0xfffff880`06c34a30 crashdmp!ContextCopy+0x0
0xfffff880`0bf57640  0xfffff800`0368b2c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`0bf57648  0xfffff800`0357aa31 nt!IoWriteCrashDump+0x391
0xfffff880`0bf576d0  0xfffff800`0368efe0 nt!IopTriageDumpDataBlocks+0x0
0xfffff880`0bf576d8  0xfffff800`0368b2c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`0bf576e0  0xfffff800`0368b2c0 nt!KeBugCheckAddPagesCallbackListHead+0x0
0xfffff880`0bf57710  0xfffff800`0353c9d0 nt!IoSetDumpRange+0x0
0xfffff880`0bf57718  0xfffff800`0353c920 nt!IoFreeDumpRange+0x0
0xfffff880`0bf57720  0xfffff800`036c2a40 nt!KiProcessorBlock+0x0
0xfffff880`0bf57740  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf57748  0xfffff800`0357bd96 nt!KeBugCheck2+0xac6
0xfffff880`0bf57910  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf57928  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf57938  0xfffff800`0375930e nt!CmpKcbCacheLookup+0x1de
0xfffff880`0bf57958  0xfffff800`03488ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0bf57960  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf57968  0xfffff800`03488ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`0bf57978  0xfffff800`03489c40 nt!KeBugCheckEx+0x0
0xfffff880`0bf57db8  0xfffff880`012d6ebd Ntfs!TxfAccessCheck+0x32d
0xfffff880`0bf57dc8  0xfffff800`03796540 nt!SeAuditingAnyFileEventsWithContext+0x50
0xfffff880`0bf57de0  0xfffff800`03488ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`0bf57de8  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf57df0  0xfffff800`03488ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0bf57e00  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf57e10  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf57e18  0xfffff800`03489d44 nt!KeBugCheckEx+0x104
0xfffff880`0bf57e58  0xfffff800`034891e9 nt!KiBugCheckDispatch+0x69
0xfffff880`0bf57e70  0xfffff800`0375930e nt!CmpKcbCacheLookup+0x1de
0xfffff880`0bf57f48  0xfffff800`0373a0b5 nt!FsRtlRemoveExtraCreateParameter+0x49
0xfffff880`0bf57f60  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf57f70  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf57f78  0xfffff800`03488ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0bf57f80  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf57f88  0xfffff800`03488ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`0bf57f98  0xfffff800`03488b3c nt!KiSystemServiceHandler+0x7c
0xfffff880`0bf57fb8  0xfffff800`034b4d40 nt!_C_specific_handler+0x0
0xfffff880`0bf57fc0  0xfffff800`036ac244 nt!BBTBuffer <PERF> (nt+0x298244)+0x0
0xfffff880`0bf57fc8  0xfffff800`0375b75c nt!CmOpenKey+0x28a
0xfffff880`0bf57fd8  0xfffff800`034b484d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`0bf57fe0  0xfffff800`036ac334 nt!BBTBuffer <PERF> (nt+0x298334)+0x0
0xfffff880`0bf57fe8  0xfffff800`035d1640 nt!_imp_NtOpenSymbolicLinkObject+0x138
0xfffff880`0bf57ff0  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58008  0xfffff800`034b3625 nt!RtlDispatchException+0x415
0xfffff880`0bf58010  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf58028  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58058  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58060  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf58078  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf580a0  0xfffff800`03488ed3 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0bf580a8  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf580b0  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf580d0  0xfffff800`03488ac0 nt!KiSystemServiceHandler+0x0
0xfffff880`0bf580d8  0xfffff800`035da694 nt!_imp_NtOpenSymbolicLinkObject+0x918c
0xfffff880`0bf58108  0xfffff880`012bfe5c Ntfs!NtfsCheckExistingFile+0x1dc
0xfffff880`0bf58158  0xfffff880`012bfe5c Ntfs!NtfsCheckExistingFile+0x1dc
0xfffff880`0bf581f8  0xfffff800`0349b5a8 nt!SeAccessCheckWithHint+0x178
0xfffff880`0bf58238  0xfffff800`03781590 nt!IopFileMapping+0x0
0xfffff880`0bf582a8  0xfffff880`012bbe1f Ntfs!NtfsOpenAttributeInExistingFile+0x50f
0xfffff880`0bf582d0  0xfffff880`0126da00 Ntfs!NtfsFileNameIndex+0x0
0xfffff880`0bf583a8  0xfffff880`012d0866 Ntfs!NtfsFindPrefixHashEntry+0x4ad
0xfffff880`0bf583e8  0xfffff880`012bf680 Ntfs!NtfsOpenExistingPrefixFcb+0x74b
0xfffff880`0bf584d8  0xfffff880`012cf1f6 Ntfs!NtfsFindStartingNode+0x5e6
0xfffff880`0bf58518  0xfffff880`01236293 Ntfs!NtfsAcquireExclusiveFcb+0x73
0xfffff880`0bf58568  0xfffff880`012cb313 Ntfs!NtfsCommonCleanup+0x5892
0xfffff880`0bf585a8  0xfffff880`012ce77c Ntfs!NtfsCommonCreate+0x21b5
0xfffff880`0bf585c8  0xfffff800`03488c40 nt!KiSystemCall64+0x0
0xfffff880`0bf585d0  0xfffff800`03788ecb nt!ObOpenObjectByName+0x53b
0xfffff880`0bf585d8  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf585e0  0xfffff800`036ac07c nt!BBTBuffer <PERF> (nt+0x29807c)+0x0
0xfffff880`0bf585e8  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf585f0  0xfffff800`036ac0c4 nt!BBTBuffer <PERF> (nt+0x2980c4)+0x0
0xfffff880`0bf585f8  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58600  0xfffff800`036abf5c nt!BBTBuffer <PERF> (nt+0x297f5c)+0x0
0xfffff880`0bf58608  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58610  0xfffff800`036ad708 nt!BBTBuffer <PERF> (nt+0x299708)+0x0
0xfffff880`0bf58618  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58620  0xfffff800`036ad7b0 nt!BBTBuffer <PERF> (nt+0x2997b0)+0x0
0xfffff880`0bf58628  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58630  0xfffff800`036ac244 nt!BBTBuffer <PERF> (nt+0x298244)+0x0
0xfffff880`0bf58638  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58640  0xfffff800`036ac334 nt!BBTBuffer <PERF> (nt+0x298334)+0x0
0xfffff880`0bf58648  0xfffff800`03414000 nt!KiSelectNextThread <PERF> (nt+0x0)+0x0
0xfffff880`0bf58650  0xfffff800`03698b04 nt!BBTBuffer <PERF> (nt+0x284b04)+0x0
0xfffff880`0bf58658  0xfffff800`034c43a7 nt!KiPreprocessFault+0x53
0xfffff880`0bf58668  0xfffff800`0349bc00 nt!SepNormalAccessCheck+0xb0
0xfffff880`0bf58680  0xfffff800`0375930e nt!CmpKcbCacheLookup+0x1de
0xfffff880`0bf58688  0xfffff800`03759310 nt!CmpKcbCacheLookup+0x1e0
0xfffff880`0bf586a0  0xfffff800`0375930f nt!CmpKcbCacheLookup+0x1df
0xfffff880`0bf586e8  0xfffff800`034c45b1 nt!KiDispatchException+0x135
0xfffff880`0bf58818  0xfffff800`0375930e nt!CmpKcbCacheLookup+0x1de
0xfffff880`0bf58828  0xfffff800`0349b5a8 nt!SeAccessCheckWithHint+0x178
0xfffff880`0bf58868  0xfffff800`03781590 nt!IopFileMapping+0x0
0xfffff880`0bf589d8  0xfffff880`00d822ec fltmgr!FltpPerformPostCallbacks+0x3cc
0xfffff880`0bf58a38  0xfffff800`03796540 nt!SeAuditingAnyFileEventsWithContext+0x50
0xfffff880`0bf58a68  0xfffff800`037848a6 nt!SeUnlockSubjectContext+0x16
0xfffff880`0bf58a98  0xfffff880`012d3006 Ntfs!NtfsAccessCheck+0xf85
0xfffff880`0bf58ae8  0xfffff800`03781590 nt!IopFileMapping+0x0
0xfffff880`0bf58af8  0xfffff800`034a1991 nt!FsRtlCheckOplockEx+0x5b1
0xfffff880`0bf58bb8  0xfffff800`034b14c5 nt!RtlGetExtendedContextLength+0x19
0xfffff880`0bf58d08  0xfffff880`012c0065 Ntfs!NtfsOpenExistingAttr+0x145
0xfffff880`0bf58d88  0xfffff800`034892c2 nt!KiExceptionDispatch+0xc2
0xfffff880`0bf58e68  0xfffff880`00e01000 fileinfo!FILockInitialize+0xfffffffffffffff8
0xfffff880`0bf58ed8  0xfffff800`0375930e nt!CmpKcbCacheLookup+0x1de
0xfffff880`0bf58f38  0xfffff800`036c5600 nt!MmPagedPoolWs+0x0
0xfffff880`0bf58f48  0xfffff800`03499a3e nt!MiResolveDemandZeroFault+0x3be
0xfffff880`0bf58f68  0xfffff800`03487bca nt!KiGeneralProtectionFault+0x10a
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
 
Thank you very much! I have removed Alcohol 52% and run the uninstaller for the driver.

So do you recommend removing both AVG and Spybot and going with Windows products? I was recommended this combination a long time ago, with older versions, and have stuck with it out of brand loyalty I guess.

It's not an easy BSOD to replicate so lets hope that sorts it!
 
It is entirely up to you what you want to use for security. I personally rely on Microsoft Security Essentials for XP through Windows 7 and Windows Defender in Windows 8 Pro (Defender in Windows 8 is essentially the same as MSE in previous versions).

My advice was only to remove one of the two programs, Spybot and/or AVG, from the system to determine if it provides stability so you can determine whether problems truly are due to a conflict with the two as it appears the problems are. Once you determine whether the conflict exists, you can decide how to proceed. You may choose at that time to remove one or both programs, or you may choose to contact both companies and report that you found a conflict between them on your system.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top