1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

BSOD and randomly crashing

Discussion in 'Windows 7' started by scottay, 2010/12/11.

  1. 2010/12/11
    scottay

    scottay Inactive Thread Starter

    Joined:
    2010/12/10
    Messages:
    2
    Likes Received:
    0
    G'day all.

    First time poster and new member :D I joined because during my research into my problem I found some good advice here, so hopefully the trend will continue.

    Well, I'm own a local computer repair company but am having trouble narrowing down a problem, ironically on my personal machine... how embarrassing is that?! LOL!

    Symptoms:
    -Occasionally I get random graphical anomalies such as colored boxes or a grouping of colored pixels out of place.
    -If I do see these anomalies I know I don't have long until a full crash. However, sometimes if clears itself up, but inevitably does end up crashing sooner or later.
    -Lately it has been simply freezing and I have to go poke the reset button.
    -It happens most while playing WoW, but is NOT limited to playing games. I get the anomalies mostly while not playing. My guess is it's b/c I'm stressing the system.

    Troubleshooting:
    I've swapped the RAM in and out of different slots and run each stick individually in each slot. I've run Prime95 for ~8 hours, Memtest86+ also for ~8 hours, PCMark 06 a number of times. I've monitored temps - all within normal range. I would try different RAM, but I don't have any other DDR3 on hand. If I need to buy some I will (I want more anyway :D). I also don't have another GPU. All my drivers are up to date and windows updates also up to date.

    Here is a recent dump file: (I'm sorry for the terribly long post...)

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
    Debug session time: Tue Dec 7 22:22:00.447 2010 (UTC - 8:00)
    System Uptime: 0 days 0:26:01.148
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
    Loading unloaded module list
    .....
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1E, {ffffffffc0000005, fffff88000fec304, 1, 0}

    Page 115dea not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : memory_corruption

    Followup: memory_corruption
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88000fec304, The address that the exception occurred at
    Arg3: 0000000000000001, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    mountmgr!MountMgrCreateClose+0
    fffff880`00fec304 0000 add byte ptr [rax],al

    EXCEPTION_PARAMETER1: 0000000000000001

    EXCEPTION_PARAMETER2: 0000000000000000

    WRITE_ADDRESS: 0000000000000000

    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    BUGCHECK_STR: 0x1E_c0000005

    DEFAULT_BUCKET_ID: CODE_CORRUPTION

    PROCESS_NAME: GoogleUpdate.e

    CURRENT_IRQL: 0

    EXCEPTION_RECORD: fffff880093af428 -- (.exr 0xfffff880093af428)
    ExceptionAddress: fffff88000fec304 (mountmgr!MountMgrCreateClose)
    ExceptionCode: c0000005 (Access violation)
    ExceptionFlags: 00000000
    NumberParameters: 2
    Parameter[0]: 0000000000000001
    Parameter[1]: 0000000000000000
    Attempt to write to address 0000000000000000

    TRAP_FRAME: fffff880093af4d0 -- (.trap 0xfffff880093af4d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004791ae0
    rdx=fffffa80040fa8d0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88000fec304 rsp=fffff880093af668 rbp=fffff80002fce260
    r8=fffffa8004791e70 r9=0000000000000000 r10=fffff880009ea180
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    mountmgr!MountMgrCreateClose:
    fffff880`00fec304 0000 add byte ptr [rax],al ds:00000000`00000000=??
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80002d05a39 to fffff80002ccb740

    STACK_TEXT:
    fffff880`093aec58 fffff800`02d05a39 : 00000000`0000001e ffffffff`c0000005 fffff880`00fec304 00000000`00000001 : nt!KeBugCheckEx
    fffff880`093aec60 fffff800`02ccad82 : fffff880`093af428 00000000`0000000c fffff880`093af4d0 fffffa80`06909b10 : nt!KiDispatchException+0x1b9
    fffff880`093af2f0 fffff800`02cc98fa : 00000000`00000001 00000000`0000000c 00000000`c0000000 fffff8a0`00284790 : nt!KiExceptionDispatch+0xc2
    fffff880`093af4d0 fffff880`00fec304 : fffff800`02fce807 00000000`0000000c fffff800`02fce260 fffffa80`06909b10 : nt!KiPageFault+0x23a
    fffff880`093af668 fffff800`02fce807 : 00000000`0000000c fffff800`02fce260 fffffa80`06909b10 fffffa80`04b13a68 : mountmgr!MountMgrCreateClose
    fffff880`093af670 fffff800`02fc4e84 : fffffa80`04791ae0 00000000`00000000 fffffa80`075cbb10 fffffa80`075cbb00 : nt!IopParseDevice+0x5a7
    fffff880`093af800 fffff800`02fc9e4d : fffffa80`075cbb10 fffff880`093af960 fffffa80`00000240 fffffa80`03a1c210 : nt!ObpLookupObjectName+0x585
    fffff880`093af900 fffff800`02fd0917 : 00000000`00000000 00000000`00000001 fffffa80`03e81500 fffff800`02cead1c : nt!ObOpenObjectByName+0x1cd
    fffff880`093af9b0 fffff800`02fe9608 : fffff880`093afd80 fffffa80`00000080 00000000`00000000 fffff880`093afd28 : nt!IopCreateFile+0x2b7
    fffff880`093afa50 fffff800`02cca993 : 00000000`00000000 fffff800`02cedd5d 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
    fffff880`093afae0 fffff800`02cc6f30 : fffff800`02fb6d1a 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`093afce8 fffff800`02fb6d1a : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`000000d0 : nt!KiServiceLinkage
    fffff880`093afcf0 fffff800`02f8b13e : fffffa80`04940cd0 fffffa80`04940cd0 fffff8a0`04d63250 fffff880`093afd98 : nt!IoGetDeviceObjectPointer+0x6a
    fffff880`093afd80 fffff800`02fb2247 : 00000078`00000101 fffffa80`03cd26c0 fffff880`093b0758 fffff8a0`04d63250 : nt!IoVolumeDeviceToDosName+0xd6
    fffff880`093b0650 fffff800`02f8b368 : fffffa80`03cd26c0 fffffa80`03cd26c0 00000000`0008e701 fffff8a0`115721b0 : nt!IopQueryNameInternal+0x417
    fffff880`093b06f0 fffff800`02fddce1 : fffffa80`03cd26c0 fffff880`093b0ca0 00000000`000000d0 00000000`00000420 : nt!IoQueryFileDosDeviceName+0x68
    fffff880`093b0740 fffff800`02cca993 : ffffffff`ffffffff 00000000`0008e2b8 00000000`0008e7b0 0000007f`00000420 : nt!NtQueryInformationProcess+0x9a0
    fffff880`093b0bb0 00000000`77b7feea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0008de78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b7feea


    STACK_COMMAND: kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !mountmgr
    fffff88000fec000-fffff88000fec046 71 bytes - mountmgr!MountMgrMountedDeviceRemoval+17c
    [ 08 48 8b 4b 10 ff 15 35:00 00 00 ff 00 00 00 ff ]
    fffff88000fec048-fffff88000fec04a 3 bytes - mountmgr!MountMgrMountedDeviceRemoval+1c4 (+0x48)
    [ 15 f3 3f:00 00 00 ]
    fffff88000fec04c-fffff88000fec058 13 bytes - mountmgr!MountMgrMountedDeviceRemoval+1c8 (+0x04)
    [ ff 48 39 36 75 cf 48 8b:00 00 00 ff 00 00 00 ff ]
    fffff88000fec05a-fffff88000fec063 10 bytes - mountmgr!MountMgrMountedDeviceRemoval+1d6 (+0x0e)
    [ 48 89 08 48 89 41 08 49:00 ff 00 00 00 ff 00 00 ]
    fffff88000fec065-fffff88000fec07b 23 bytes - mountmgr!MountMgrMountedDeviceRemoval+1e1 (+0x0b)
    [ eb 59 4c 8d 65 30 49 8b:00 00 ff 00 00 00 ff 00 ]
    fffff88000fec07e-fffff88000fec083 6 bytes - mountmgr!MountMgrMountedDeviceRemoval+1fa (+0x19)
    [ 49 8b 86 50 01 00:00 ff 00 00 00 ff ]
    fffff88000fec085-fffff88000fec08b 7 bytes - mountmgr!MountMgrMountedDeviceRemoval+201 (+0x07)
    [ 33 d2 48 89 85 98 00:00 00 ff 00 00 00 ff ]
    fffff88000fec08e-fffff88000fec0aa 29 bytes - mountmgr!MountMgrMountedDeviceRemoval+20a (+0x09)
    [ 48 8b 5e 08 48 8b 06 48:00 ff 00 00 00 ff 00 00 ]
    fffff88000fec0ac-fffff88000fec0ae 3 bytes - mountmgr!MountMgrMountedDeviceRemoval+228 (+0x1e)
    [ 15 8f 3f:00 00 00 ]
    fffff88000fec0b0-fffff88000fec0ca 27 bytes - mountmgr!MountMgrMountedDeviceRemoval+22c (+0x04)
    [ ff 48 8b f3 48 8b 36 49:00 00 00 ff 00 00 00 ff ]
    fffff88000fec0cc-fffff88000fec0ce 3 bytes - mountmgr!MountMgrMountedDeviceRemoval+248 (+0x1c)
    [ 15 6f 3f:00 00 00 ]
    fffff88000fec0d0-fffff88000fec0d3 4 bytes - mountmgr!MountMgrMountedDeviceRemoval+24c (+0x04)
    [ ff 80 7f 68:00 00 00 ff ]
    fffff88000fec0d5-fffff88000fec11a 70 bytes - mountmgr!MountMgrMountedDeviceRemoval+251 (+0x05)
    [ 75 0c 48 8b 4f 50 33 d2:00 00 ff 00 00 00 ff 00 ]
    fffff88000fec11c-fffff88000fec19c 129 bytes - mountmgr!MountMgrMountedDeviceRemoval+298 (+0x47)
    [ 85 c0 74 08 48 8b 1b 48:00 00 00 ff 00 00 00 ff ]
    fffff88000fec19f-fffff88000fec1a6 8 bytes - mountmgr!MountMgrMountedDeviceNotification+1b (+0x83)
    [ 48 8b fa ff 15 58 40 ff:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec1a8-fffff88000fec1af 8 bytes - mountmgr!MountMgrMountedDeviceNotification+24 (+0x09)
    [ 65 48 8b 0c 25 88 01 00:00 00 00 ff 00 00 00 ff ]
    fffff88000fec1b1-fffff88000fec1ba 10 bytes - mountmgr!MountMgrMountedDeviceNotification+2d (+0x09)
    [ b2 01 40 8a f0 ff 15 94:00 00 ff 00 00 00 ff 00 ]
    fffff88000fec1bc-fffff88000fec1cb 16 bytes - mountmgr!MountMgrMountedDeviceNotification+38 (+0x0b)
    [ 48 8b 4b 04 4c 8d 0d 39:00 00 00 ff 00 00 00 ff ]
    fffff88000fec1ce-fffff88000fec1d8 11 bytes - mountmgr!MountMgrMountedDeviceNotification+4a (+0x12)
    [ 75 11 48 8b 4b 0c 49 3b:00 ff 00 00 00 ff 00 00 ]
    fffff88000fec1db-fffff88000fec1f6 28 bytes - mountmgr!MountMgrMountedDeviceNotification+57 (+0x0d)
    [ 75 04 33 c0 eb 05 1b c0:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec1f8-fffff88000fec1fd 6 bytes - mountmgr!MountMgrMountedDeviceNotification+74 (+0x1d)
    [ ff 85 c0 0f 89 d7:00 00 00 ff 00 00 ]
    fffff88000fec1ff - mountmgr!MountMgrMountedDeviceNotification+7b (+0x07)
    [ 00:ff ]
    fffff88000fec201-fffff88000fec206 6 bytes - mountmgr!MountMgrMountedDeviceNotification+7d (+0x02)
    [ 4c 8b 15 08 4f ff:00 00 ff 00 00 00 ]
    fffff88000fec208-fffff88000fec214 13 bytes - mountmgr!MountMgrMountedDeviceNotification+84 (+0x07)
    [ 48 8d 0d 01 4f ff ff 4c:00 00 00 ff 00 00 00 ff ]
    fffff88000fec217-fffff88000fec21f 9 bytes - mountmgr!MountMgrMountedDeviceNotification+93 (+0x0f)
    [ 00 41 f6 42 2c 01 0f 84:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec223-fffff88000fec22b 9 bytes - mountmgr!MountMgrMountedDeviceNotification+9f (+0x0c)
    [ 41 80 7a 29 02 0f 82 aa:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec22e-fffff88000fec22f 2 bytes - mountmgr!MountMgrMountedDeviceNotification+aa (+0x0b)
    [ ba e4:00 ff ]
    fffff88000fec233-fffff88000fec23b 9 bytes - mountmgr!MountMgrMountedDeviceNotification+af (+0x05)
    [ 49 8b 4a 18 44 8b c8 e9:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec23f-fffff88000fec247 9 bytes - mountmgr!MountMgrMountedDeviceNotification+bb (+0x0c)
    [ 48 8b 4b 04 49 3b 89 50:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec24a-fffff88000fec254 11 bytes - mountmgr!MountMgrMountedDeviceNotification+c6 (+0x0b)
    [ 75 11 48 8b 4b 0c 49 3b:00 ff 00 00 00 ff 00 00 ]
    fffff88000fec257-fffff88000fec27a 36 bytes - mountmgr!MountMgrMountedDeviceNotification+d3 (+0x0d)
    [ 75 04 33 c0 eb 05 1b c0:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec27c-fffff88000fec282 7 bytes - mountmgr!MountMgrMountedDeviceNotification+f8 (+0x25)
    [ ff 48 8d 0d 8c 4e ff:00 00 00 ff 00 00 00 ]
    fffff88000fec284-fffff88000fec298 21 bytes - mountmgr!MountMgrMountedDeviceNotification+100 (+0x08)
    [ 4c 3b d1 74 4f 41 f6 42:00 00 00 ff 00 00 00 ff ]
    fffff88000fec29b-fffff88000fec2a2 8 bytes - mountmgr!MountMgrMountedDeviceNotification+117 (+0x17)
    [ 00 eb 95 48 8b 05 6b 4e:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec2a4-fffff88000fec2aa 7 bytes - mountmgr!MountMgrMountedDeviceNotification+120 (+0x09)
    [ ff 48 8d 0d 64 4e ff:00 00 00 ff 00 00 00 ]
    fffff88000fec2ac-fffff88000fec2c3 24 bytes - mountmgr!MountMgrMountedDeviceNotification+128 (+0x08)
    [ 48 3b c1 74 27 f6 40 2c:00 00 00 ff 00 00 00 ff ]
    fffff88000fec2c6-fffff88000fec2c8 3 bytes - mountmgr!MountMgrMountedDeviceNotification+142 (+0x1a)
    [ 41 b9 0d:00 ff 00 ]
    fffff88000fec2cb-fffff88000fec2d6 12 bytes - mountmgr!MountMgrMountedDeviceNotification+147 (+0x05)
    [ c0 4c 8d 05 f5 42 ff ff:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec2d8-fffff88000fec2df 8 bytes - mountmgr!MountMgrMountedDeviceNotification+154 (+0x0d)
    [ 65 48 8b 0c 25 88 01 00:00 00 00 ff 00 00 00 ff ]
    fffff88000fec2e1-fffff88000fec30d 45 bytes - mountmgr!MountMgrMountedDeviceNotification+15d (+0x09)
    [ 40 8a d6 ff 15 66 3d ff:00 00 ff 00 00 00 ff 00 ]
    fffff88000fec30f - mountmgr!MountMgrCreateClose+b (+0x2e)
    [ 00:ff ]
    fffff88000fec311-fffff88000fec315 5 bytes - mountmgr!MountMgrCreateClose+d (+0x02)
    [ 4c 8b c2 80 38:00 00 ff 00 00 ]
    fffff88000fec317-fffff88000fec325 15 bytes - mountmgr!MountMgrCreateClose+13 (+0x06)
    [ 75 11 8a 40 10 24 01 f6:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec327-fffff88000fec32f 9 bytes - mountmgr!MountMgrCreateClose+23 (+0x10)
    [ c0 eb 02 33 db 48 83 62:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec331-fffff88000fec36c 60 bytes - mountmgr!MountMgrCreateClose+2d (+0x0a)
    [ 89 5a 30 49 8b c8 33 d2:00 00 ff 00 00 00 ff 00 ]
    fffff88000fec36f-fffff88000fec39b 45 bytes - mountmgr!MountMgrCreatePoint+1f (+0x3e)
    [ 00 4c 8b 42 18 45 33 e4:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec39d-fffff88000fec3a0 4 bytes - mountmgr!MountMgrCreatePoint+4d (+0x2e)
    [ c0 e9 45 01:00 00 ff 00 ]
    fffff88000fec3a3-fffff88000fec3c7 37 bytes - mountmgr!MountMgrCreatePoint+53 (+0x06)
    [ 45 0f b7 50 02 45 0f b7:ff 00 00 00 ff 00 00 00 ]
    fffff88000fec3ca-fffff88000fec3d6 13 bytes - mountmgr!MountMgrCreatePoint+7a (+0x27)
    [ c0 48 8b 0d 3e 4d ff ff:00 ff 00 00 00 ff 00 00 ]
    fffff88000fec3d8-fffff88000fec3df 8 bytes - mountmgr!MountMgrCreatePoint+88 (+0x0e)
    [ ff 48 3b c8 0f 84 06 01:00 00 00 ff 00 00 00 ff ]
    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
    4866 errors : !mountmgr (fffff88000fec000-fffff88000fed4af)

    MODULE_NAME: memory_corruption

    IMAGE_NAME: memory_corruption

    FOLLOWUP_NAME: memory_corruption

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MEMORY_CORRUPTOR: LARGE

    FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE

    BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE

    Followup: memory_corruption
    ---------

    Any help would be greatly appreciated. Thanks in advance!
    Scott
     
  2. 2010/12/11
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Guess what:

    As we routinely suggest in these cases:

    The only satisfactory way of testing RAM is to test the installed RAM in various configurations. If you have a single module swap it around the slots. If you have a pair of modules run each one singly, swapping between slots; then run them in pairs swapping between pairs of slots. If you have 2 sets of matched modules do not get them mixed up.

    Also make sure you have the latest BIOS for your motherboard.

    Also check out your hard drive using the manufacturer's disk diagnostics:

    ExcelStore

    Fujitsu

    Hitachi/IBM

    Samsung

    Seagate, Maxtor, Quantum

    Toshiba

    Western Digital
     
    Arie,
    #2

  3. to hide this advert.

  4. 2010/12/11
    scottay

    scottay Inactive Thread Starter

    Joined:
    2010/12/10
    Messages:
    2
    Likes Received:
    0
    Thanks for the reply.

    In further diagnosing the problem I discovered that asio.sys was casing a conflict. asio.sys is related to the ASUS mobo utilites, so I've uninstalled them and removed the driver. So far things are looking good, but it's an intermittent problem.

    I'll keep y'all posted
    Scott
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.