BSOD op nieuw systeem

Status
Niet open voor verdere reacties.

LiquidBlack NL

Gebruiker
Lid geworden
12 jun 2009
Berichten
18
Beste,

Enkele dagen geleden heb ik een systeem in elkaar gezet met de volgende hardware:
MB: Gigabyte Z97X Gaming 3
CPU: Intel Core i7 4790
CPU koeler: Scythe Mugen 4 PCGH Edition
RAM: Crucial Ballistix Sport 16GB DDR3-1600 CL9 kit
GPU: MSI GeForce GTX 970 Gaming 4GB
HDD: Samsung 850 Evo 500GB
PSU: Corsair RM650

Deze setup geeft onregelmatig bluescreens onder een installatie van zowel Windows 7 / Windows 8.1. Ik krijg niet achterhaald wat de oorzaak van deze bsod is.
Het volgende heb ik al geprobeerd:
Memtest
CPU test Intel
CPU stress test
GPU stress test
SSD check Samsung Magician
Bios geupdate naar nieuwste versie

---

Misschien dat iemand met deze informatie mij op de goede weg kan helpen?

---

Meest recente bsod op Windows 7 (versie 6.1 build 7601: Service Pack 1)

Code:
Probleemhandtekening:
  Gebeurtenisnaam van probleem:	BlueScreen
  Versie van besturingssysteem:	6.1.7601.2.1.0.256.1
  Landinstelling-id:	1043

Aanvullende informatie over dit probleem:
  BCCode:	1000007e
  BCP1:	FFFFFFFFC0000005
  BCP2:	FFFFF880016B75E0
  BCP3:	FFFFF8800391D568
  BCP4:	FFFFF8800391CDC0
  OS Version:	6_1_7601
  Service Pack:	1_0
  Product:	256_1

Bestanden die helpen bij het beschrijven van het probleem:
  C:\Windows\Minidump\062315-5522-01.dmp
  C:\Users\Sjoerd Jansen\AppData\Local\Temp\WER-1270534-0.sysdata.xml

Lees de onlineprivacyverklaring:
  http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0413

Als de onlineprivacyverklaring niet beschikbaar is, lees dan onze offlineprivacyverklaring:
  C:\Windows\system32\nl-NL\erofflps.txt
 

Bijgevoegd de Memory.dmp bugcheck Analysis:

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`0300d000 PsLoadedModuleList = 0xfffff800`03252890
Debug session time: Tue Jun 23 10:23:29.925 2015 (UTC + 2:00)
System Uptime: 0 days 12:30:23.430
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols

Loading unloaded module list
.....................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7E, {ffffffffc0000005, fffff880016b75e0, fffff8800391d568, fffff8800391cdc0}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFsdClose+a0 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880016b75e0, The address that the exception occurred at
Arg3: fffff8800391d568, Exception Record Address
Arg4: fffff8800391cdc0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.

FAULTING_IP: 
Ntfs!NtfsFsdClose+a0
fffff880`016b75e0 483b99b0000000  cmp     rbx,qword ptr [rcx+0B0h]

EXCEPTION_RECORD:  fffff8800391d568 -- (.exr 0xfffff8800391d568)
ExceptionAddress: fffff880016b75e0 (Ntfs!NtfsFsdClose+0x00000000000000a0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800391cdc0 -- (.cxr 0xfffff8800391cdc0;r)
rax=0000000000000002 rbx=fffffa8016b6c070 rcx=0230fffffa801677
rdx=0000000000000150 rsi=0000000000000000 rdi=fffff8a017a964a0
rip=fffff880016b75e0 rsp=fffff8800391d7a0 rbp=fffff8800391d8e0
 r8=fffffa800d68d9c0  r9=0000000000000002 r10=fffffa800d68bc00
r11=fffffa801535a4f0 r12=fffff8a017a962b2 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!NtfsFsdClose+0xa0:
fffff880`016b75e0 483b99b0000000  cmp     rbx,qword ptr [rcx+0B0h] ds:002b:0230ffff`fa801727=????????????????
Last set context:
rax=0000000000000002 rbx=fffffa8016b6c070 rcx=0230fffffa801677
rdx=0000000000000150 rsi=0000000000000000 rdi=fffff8a017a964a0
rip=fffff880016b75e0 rsp=fffff8800391d7a0 rbp=fffff8800391d8e0
 r8=fffffa800d68d9c0  r9=0000000000000002 r10=fffffa800d68bc00
r11=fffffa801535a4f0 r12=fffff8a017a962b2 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
Ntfs!NtfsFsdClose+0xa0:
fffff880`016b75e0 483b99b0000000  cmp     rbx,qword ptr [rcx+0B0h] ds:002b:0230ffff`fa801727=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFsdClose+a0
fffff880`016b75e0 483b99b0000000  cmp     rbx,qword ptr [rcx+0B0h]

BUGCHECK_STR:  0x7E

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff88001475bcf to fffff880016b75e0

STACK_TEXT:  
fffff880`0391d7a0 fffff880`01475bcf : fffff880`0391d950 fffffa80`1675b010 fffff880`0391d900 fffff800`00000002 : Ntfs!NtfsFsdClose+0xa0
fffff880`0391d8a0 fffff880`014746df : fffffa80`16758660 fffffa80`1675b010 fffffa80`0d68bc00 fffffa80`1675b010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0391d930 fffff800`0337ba9e : fffffa80`16b6c070 fffffa80`0dc7a820 fffff8a0`1f5673e0 fffffa80`16758660 : fltmgr!FltpDispatch+0xcf
fffff880`0391d990 fffff800`03089d34 : 00000000`00000001 00000000`00000000 fffffa80`0cabbf30 00000000`00000000 : nt!IopDeleteFile+0x11e
fffff880`0391da20 fffff800`0331dce9 : 00000000`00000000 00000000`00088081 fffffa80`16b6c740 fffffa80`16b6b470 : nt!ObfDereferenceObject+0xd4
fffff880`0391da80 fffff800`030cc701 : fffffa80`16b6c748 00000000`00000001 00000000`00000000 00000000`00000631 : nt!MiSegmentDelete+0xa1
fffff880`0391dac0 fffff800`030cc979 : 00000000`00000000 00000000`00000080 fffffa80`0ca0c890 fffffa80`00000012 : nt!MiProcessDereferenceList+0x131
fffff880`0391db80 fffff800`03319aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceSegmentThread+0x10d
fffff880`0391dc00 fffff800`03071426 : fffff880`009b3180 fffffa80`0ca89260 fffff880`009be0c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0391dc40 00000000`00000000 : fffff880`0391e000 fffff880`03918000 fffff880`0391d6b0 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsFsdClose+a0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  52e1be8a

IMAGE_VERSION:  6.1.7601.18378

STACK_COMMAND:  .cxr 0xfffff8800391cdc0 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_Ntfs!NtfsFsdClose+a0

BUCKET_ID:  X64_0x7E_Ntfs!NtfsFsdClose+a0

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x7e_ntfs!ntfsfsdclose+a0

FAILURE_ID_HASH:  {2599bfac-dc6e-648e-1fd6-779a13fb5960}

Followup: MachineOwner
---------
 
Bedankt voor uw reactie!

Ik ga inderdaad eens een andere hardeschijf proberen. Bij een vriend kan ik zijn M4 crucial SSD 128gb lenen.

Edit:
Inmiddels zit de andere SSD erin en heb ik dezelfde Windows 7 geïnstalleerd. Nu afwachten.
 
Laatst bewerkt:
Intel® Rapid Storage Technology driver geínstalleerd?

Ja, bij de vorige installatie op de Samsung SSD had ik dat wel (zowel Windows 7 als bij Windows 8.1). Bij de net nieuwe installatie op de M4 SSD heb ik deze NIET geïnstalleerd omdat ik via Google de indruk kreeg dat die driver ook wel eens problemen zou kunnen geven?
 
Idd, die zorgt soms voor een BSOD.
In 7 die hotfix ook gebruikt?
http://www.gigabyte.com/products/product-page.aspx?pid=4966#dl
En nog wel BSOD's?

https://downloadcenter.intel.com/download/24779/Intel-Rapid-Storage-Technology-Intel-RST-RAID-Driver
1002 is de laatste en die bij Gigabyte staat is de 1001.

PS, miss handiger onderstaande tool te gebruiken, zie je welk bestand of bestanden het probleem veroorzaken.
Lijkt mij een software/driver probleem en niet die van de hardware.

http://www.resplendence.com/whocrashed
 
Laatst bewerkt:
Op de Gigabyte website staat de versie: 13.6.2.1001
En bij Intel de versie: 13.6.0.1002

Kijkend naar de versienummers zou ik het vreemd vinden dat Gigabyte een nieuwere versie aanbied dan Intel zelf trouwens.

Bij de vorige installaties heb ik inderdaad de versie op de website van Gigabyte gebruikt inclusief hotfix (deze gaf aan dat de hotfix al was geïnstalleerd, waarschijnlijk door de tot Juni geupdate ISO die ik heb gebruikt voor de installatie).

Dus het zou inderdaad mogelijk zijn dat deze de BSOD's veroorzaakte. En dat zou in theorie kunnen verklaren waarom het probleem zich bij zowel de Windows 7 als de Windows 8.1 installatie voordoet, omdat ik daar dezelfde drivers voor heb gebruikt.

Op de huidige installatie (op de leen SSD) heb ik hem niet geïnstalleerd om eens te testen.
 
Laatst bewerkt door een moderator:
Vandaag met het uit slaapstand halen helaas toch weer een BSOD (de eerste sinds herinstallatie).
Ik haalde het systeem uit slaapstand en na 3 seconde viel het systeem direct weer uit en moest ik hem weer aanzetten.

Ik heb het volgende gevonden:
http://www.corsair.com/se-fi/rm-series-rm650-80-plus-gold-certified-power-supply-eu
Tabblad: FAQ
2e artikel genaamd: Haswell compatibility with Corsair PSU

Zou dit mogelijk het probleem kunnen veroorzaken? Want de onderstaande BSOD geeft geen specifieke foutmelding, het lijkt puur het opeens onderbreken van de voeding.
(Aan de hand van de informatie die ik vond over problemen met PSU's en Haswell heb ik de powerstate C6/C7 eens uitgeschakeld in mijn Bios om te kijken of het probleem zich dan blijft voordoen.)


Code:
Probleemhandtekening:
  Gebeurtenisnaam van probleem:	BlueScreen
  Versie van besturingssysteem:	6.1.7601.2.1.0.256.1
  Landinstelling-id:	1043

Aanvullende informatie over dit probleem:
  BCCode:	1a
  BCP1:	0000000000005003
  BCP2:	FFFFF780C0000000
  BCP3:	000000000000009F
  BCP4:	000000A10000013A
  OS Version:	6_1_7601
  Service Pack:	1_0
  Product:	256_1

Bestanden die helpen bij het beschrijven van het probleem:
  C:\Windows\Minidump\062715-7722-01.dmp
  C:\Users\Sjoerd Jansen\AppData\Local\Temp\WER-12121-0.sysdata.xml

Lees de onlineprivacyverklaring:
  http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0413

Als de onlineprivacyverklaring niet beschikbaar is, lees dan onze offlineprivacyverklaring:
  C:\Windows\system32\nl-NL\erofflps.txt

Memory.dmp bugcheck Analysis:

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`03007000 PsLoadedModuleList = 0xfffff800`0324c890
Debug session time: Sat Jun 27 12:15:16.500 2015 (UTC + 2:00)
System Uptime: 1 days 1:34:20.900
Loading Kernel Symbols
...............................................................
....................................................Page 3c9bb6 not present in the dump file. Type ".hh dbgerr004" for details
............
.Page 3c81a7 not present in the dump file. Type ".hh dbgerr004" for details
.......................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffd9018).  Type ".hh dbgerr001" for details
Loading unloaded module list
................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff780c0000000, 9f, a10000013a}

Page 3c9bb6 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+299d9 )

Followup: MachineOwner
---------

7: kd> 
7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 000000000000009f
Arg4: 000000a10000013a

Debugging Details:
------------------

Page 3c9bb6 not present in the dump file. Type ".hh dbgerr004" for details

BUGCHECK_STR:  0x1a_5003

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff800030e30ff to fffff80003079a40

STACK_TEXT:  
fffff880`0ab44218 fffff800`030e30ff : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`0000009f : nt!KeBugCheckEx
fffff880`0ab44220 fffff800`0308ffb0 : fffff6fc`c002a688 00000000`00000001 fffffa80`00000010 fffffa80`0b472240 : nt! ?? ::FNODOBFM::`string'+0x299d9
fffff880`0ab44390 fffff800`03068a3e : fffff980`054c1000 00000000`00010000 00000000`00000000 fffffa80`113633a0 : nt!MmCheckCachedPageStates+0x3c0
fffff880`0ab44540 fffff800`03363460 : fffff880`00000000 00000000`00001000 fffffa80`0f838b40 00000000`03c50b70 : nt!CcFetchDataForRead+0x10e
fffff880`0ab445a0 fffff880`012eb01f : fffff880`00000000 00000000`00000005 fffffa80`0003f000 fffffa80`0f838b01 : nt!CcCopyRead+0x180
fffff880`0ab44660 fffff880`0103b098 : fffffa80`0f838b40 fffffa80`11363338 00000000`0012019f fffffa80`0f838b01 : Ntfs!NtfsCopyReadA+0x18f
fffff880`0ab44840 fffff880`0103e8ba : fffff880`0ab44910 00000000`03c50b03 00000000`03c50b00 fffffa80`0f838b00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`0ab448a0 fffff880`0105c630 : fffffa80`0f838b40 00000000`00000000 fffff880`0ab44a00 00000000`00010000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0ab448e0 fffff800`03362f99 : fffffa80`0f838b40 00000000`00000001 fffffa80`0caa5a30 fffffa80`0f838b40 : fltmgr!FltpFastIoRead+0x1d0
fffff880`0ab44980 fffff800`03078cd3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`0ab44a70 00000000`77c4dc3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01e5d888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c4dc3a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+299d9
fffff800`030e30ff cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+299d9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5507a73c

IMAGE_VERSION:  6.1.7601.18798

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+299d9

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+299d9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!_??_::fnodobfm::_string_+299d9

FAILURE_ID_HASH:  {6549b472-f267-e34a-3282-c4ea92cdec98}

Followup: MachineOwner
---------

C:\Windows\Minidump\062715-7722-01.dmp

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062715-7722-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`03007000 PsLoadedModuleList = 0xfffff800`0324c890
Debug session time: Sat Jun 27 12:15:16.500 2015 (UTC + 2:00)
System Uptime: 1 days 1:34:20.900
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff780c0000000, 9f, a10000013a}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+299d9 )

Followup: MachineOwner
---------

7: kd> 
7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 000000000000009f
Arg4: 000000a10000013a

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff800030e30ff to fffff80003079a40

STACK_TEXT:  
fffff880`0ab44218 fffff800`030e30ff : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`0000009f : nt!KeBugCheckEx
fffff880`0ab44220 fffff800`0308ffb0 : fffff6fc`c002a688 00000000`00000001 fffffa80`00000010 fffffa80`0b472240 : nt! ?? ::FNODOBFM::`string'+0x299d9
fffff880`0ab44390 fffff800`03068a3e : fffff980`054c1000 00000000`00010000 00000000`00000000 fffffa80`113633a0 : nt!MmCheckCachedPageStates+0x3c0
fffff880`0ab44540 fffff800`03363460 : fffff880`00000000 00000000`00001000 fffffa80`0f838b40 00000000`03c50b70 : nt!CcFetchDataForRead+0x10e
fffff880`0ab445a0 fffff880`012eb01f : fffff880`00000000 00000000`00000005 fffffa80`0003f000 fffffa80`0f838b01 : nt!CcCopyRead+0x180
fffff880`0ab44660 fffff880`0103b098 : fffffa80`0f838b40 fffffa80`11363338 00000000`0012019f fffffa80`0f838b01 : Ntfs!NtfsCopyReadA+0x18f
fffff880`0ab44840 fffff880`0103e8ba : fffff880`0ab44910 00000000`03c50b03 00000000`03c50b00 fffffa80`0f838b00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`0ab448a0 fffff880`0105c630 : fffffa80`0f838b40 00000000`00000000 fffff880`0ab44a00 00000000`00010000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0ab448e0 fffff800`03362f99 : fffffa80`0f838b40 00000000`00000001 fffffa80`0caa5a30 fffffa80`0f838b40 : fltmgr!FltpFastIoRead+0x1d0
fffff880`0ab44980 fffff800`03078cd3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`0ab44a70 00000000`77c4dc3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01e5d888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c4dc3a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+299d9
fffff800`030e30ff cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+299d9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5507a73c

IMAGE_VERSION:  6.1.7601.18798

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+299d9

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+299d9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_5003_nt!_??_::fnodobfm::_string_+299d9

FAILURE_ID_HASH:  {6549b472-f267-e34a-3282-c4ea92cdec98}

Followup: MachineOwner
---------
 
Laatst bewerkt:
Maak eens een uitdraai van Whocrashed, link staat in reply 6, staat een code in waar je wat mee kunt en ook de naam van het bestand.
 
Daarnet weer een BSOD:

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062715-5959-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`03049000 PsLoadedModuleList = 0xfffff800`0328e890
Debug session time: Sat Jun 27 18:08:13.182 2015 (UTC + 2:00)
System Uptime: 0 days 4:41:39.979
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800ecb1698, fffff8800ecb0ef0, fffff88001210674}

Probably caused by : Ntfs.sys ( Ntfs!NtfsProcessUsnRecordsForCommit+134 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800ecb1698
Arg3: fffff8800ecb0ef0
Arg4: fffff88001210674

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800ecb1698 -- (.exr 0xfffff8800ecb1698)
ExceptionAddress: fffff88001210674 (Ntfs!NtfsProcessUsnRecordsForCommit+0x0000000000000134)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800ecb0ef0 -- (.cxr 0xfffff8800ecb0ef0;r)
rax=005f0066003c0010 rbx=fffffa800d2fdcb8 rcx=0000202000000000
rdx=fffff8a002cd2a40 rsi=fffffa800d2fdc30 rdi=fffff8a00b313010
rip=fffff88001210674 rsp=fffff8800ecb18d0 rbp=fffffa800d2fdcb8
 r8=fffffa800d2193c8  r9=0000000000000000 r10=000000000a2f0000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00b313140
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
Ntfs!NtfsProcessUsnRecordsForCommit+0x134:
fffff880`01210674 488908          mov     qword ptr [rax],rcx ds:002b:005f0066`003c0010=????????????????
Last set context:
rax=005f0066003c0010 rbx=fffffa800d2fdcb8 rcx=0000202000000000
rdx=fffff8a002cd2a40 rsi=fffffa800d2fdc30 rdi=fffff8a00b313010
rip=fffff88001210674 rsp=fffff8800ecb18d0 rbp=fffffa800d2fdcb8
 r8=fffffa800d2193c8  r9=0000000000000000 r10=000000000a2f0000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00b313140
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
Ntfs!NtfsProcessUsnRecordsForCommit+0x134:
fffff880`01210674 488908          mov     qword ptr [rax],rcx ds:002b:005f0066`003c0010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  1

ERROR_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f8100
GetUlongFromAddress: unable to read from fffff800032f81c0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsProcessUsnRecordsForCommit+134
fffff880`01210674 488908          mov     qword ptr [rax],rcx

FAULTING_IP: 
Ntfs!NtfsProcessUsnRecordsForCommit+134
fffff880`01210674 488908          mov     qword ptr [rax],rcx

BUGCHECK_STR:  0x24

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff880012ac81f to fffff88001210674

STACK_TEXT:  
fffff880`0ecb18d0 fffff880`012ac81f : 00000000`00000000 fffffa80`0d2fdc30 fffff800`03266280 00000000`00000000 : Ntfs!NtfsProcessUsnRecordsForCommit+0x134
fffff880`0ecb1910 fffff880`012bf377 : 00000000`00000000 fffffa80`0d04b180 fffffa80`0d2fdc30 fffff8a0`0b313010 : Ntfs!NtfsCommitCurrentTransaction+0x1f
fffff880`0ecb19a0 fffff880`0129c608 : fffffa80`0d2fdc30 fffff8a0`02cd2a40 fffff8a0`0b313010 fffffa80`0d04b180 : Ntfs!NtfsCheckpointCurrentTransaction+0x27
fffff880`0ecb19d0 fffff880`012eed32 : fffffa80`0d2fdc30 fffff8a0`0b313140 fffff8a0`0b313010 fffffa80`0d04b180 : Ntfs!NtfsCommonClose+0x688
fffff880`0ecb1aa0 fffff800`030c56a5 : 00000000`00000000 fffff800`033b1701 00000000`00000000 00000000`00000002 : Ntfs!NtfsFspCloseInternal+0x186
fffff880`0ecb1b70 fffff800`03355aba : 00000000`00000000 fffffa80`1095bb50 00000000`00000080 fffffa80`0ca70450 : nt!ExpWorkerThread+0x111
fffff880`0ecb1c00 fffff800`030ad426 : fffff800`0323be80 fffffa80`1095bb50 fffff800`03249cc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0ecb1c40 00000000`00000000 : fffff880`0ecb2000 fffff880`0ecac000 fffff880`0ecb0d50 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsProcessUsnRecordsForCommit+134

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  52e1be8a

IMAGE_VERSION:  6.1.7601.18378

STACK_COMMAND:  .cxr 0xfffff8800ecb0ef0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsProcessUsnRecordsForCommit+134

BUCKET_ID:  X64_0x24_Ntfs!NtfsProcessUsnRecordsForCommit+134

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x24_ntfs!ntfsprocessusnrecordsforcommit+134

FAILURE_ID_HASH:  {8490c234-c32e-f60f-7cb2-fd1407fc04de}

Followup: MachineOwner
---------


Uitdraai van WhoCrashed:
Code:
System Information (local)
--------------------------------------------------------------------------------

computer name: SJOERDJANSEN-PC
windows version: Windows 7 Service Pack 1, 6.1, build: 7601
windows dir: C:\Windows
Hardware: Z97X-Gaming 3, Gigabyte Technology Co., Ltd.
CPU: GenuineIntel Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz Intel586, level: 6
8 logical processors, active mask: 255
RAM: 17008209920 total




--------------------------------------------------------------------------------
Crash Dump Analysis
--------------------------------------------------------------------------------

Crash dump directory: C:\Windows\Minidump

Crash dumps are enabled on your computer.

On Sat 27-6-2015 16:08:13 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062715-5959-01.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x4211) 
Bugcheck code: 0x24 (0x1904FB, 0xFFFFF8800ECB1698, 0xFFFFF8800ECB0EF0, 0xFFFFF88001210674)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: Besturingssysteem Microsoft® Windows®
company: Microsoft Corporation
description: NT-bestandssysteemstuurprogramma
Bug check description: This indicates a problem occurred in the NTFS file system. 
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time. 



On Sat 27-6-2015 16:08:13 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x4211) 
Bugcheck code: 0x24 (0x1904FB, 0xFFFFF8800ECB1698, 0xFFFFF8800ECB0EF0, 0xFFFFF88001210674)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: Besturingssysteem Microsoft® Windows®
company: Microsoft Corporation
description: NT-bestandssysteemstuurprogramma
Bug check description: This indicates a problem occurred in the NTFS file system. 
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time. 



On Sat 27-6-2015 10:15:16 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062715-7722-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x72A40) 
Bugcheck code: 0x1A (0x5003, 0xFFFFF780C0000000, 0x9F, 0xA10000013A)
Error: MEMORY_MANAGEMENT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a severe memory management error occurred.
This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules. 
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
 
Het gaat over een schijf, memory management,drivers en een programma, weet je nog niets

http://www.memtest.org/
Zou beginnen met een geheugentest om die uit te kunnen sluiten.

En je had nu de installatie op de geleende SSD?
 
Correct, de installatie staat op de geleende SSD.
Ik zal vannacht memtest de hele nacht eens laten lopen.

Edit 28-06-15: 23:22 :
Memtest: 13 cycles laten lopen in 28 uur
IMG_20150628_231038.jpg

Dat blijkt dus niet het probleem. :confused:
 
Laatst bewerkt:
En de volgende (het is weer niet dezelfde als hiervoor):

WhoCrashed:
Code:
On Mon 29-6-2015 10:11:11 GMT your computer crashed
crash dump file: C:\Windows\Minidump\062915-5896-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x72A40) 
Bugcheck code: 0x4E (0x2, 0xAC97C, 0x42FDFF, 0x10)
Error: PFN_LIST_CORRUPT
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the page frame number (PFN) list is corrupted.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules. 
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time. 



On Mon 29-6-2015 10:11:11 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0) 
Bugcheck code: 0x4E (0x2, 0xAC97C, 0x42FDFF, 0x10)
Error: PFN_LIST_CORRUPT
Bug check description: This indicates that the page frame number (PFN) list is corrupted.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem. This might be a case of memory corruption. More often memory corruption happens because of software errors in buggy drivers, not because of faulty RAM modules. 
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.

BSOD:
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062915-5896-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`03013000 PsLoadedModuleList = 0xfffff800`03258890
Debug session time: Mon Jun 29 12:11:11.423 2015 (UTC + 2:00)
System Uptime: 0 days 13:00:14.219
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {2, ac97c, 42fdff, 10}

Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8d )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000000ac97c, entry in list being removed
Arg3: 000000000042fdff, highest physical page number
Arg4: 0000000000000010, reference count of entry being removed

Debugging Details:
------------------


BUGCHECK_STR:  0x4E_2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  AutoPico.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80003096e5d to fffff80003085a40

STACK_TEXT:  
fffff880`020ad638 fffff800`03096e5d : 00000000`0000004e 00000000`00000002 00000000`000ac97c 00000000`0042fdff : nt!KeBugCheckEx
fffff880`020ad640 fffff800`030674b4 : 00000000`00000000 fffffa80`0fb4d900 fffff8a0`01c916c8 fffff8a0`01c8fe88 : nt!MiUnlinkPageFromLockedList+0x8d
fffff880`020ad6c0 fffff800`033603d9 : fffffa80`0fb4d900 fffff6fc`4005a190 fffff8a0`00000002 00000000`00000000 : nt!MiValidateImagePages+0x244
fffff880`020ad770 fffff800`03360518 : ffffffff`ffffffff 00000000`00000001 fffff8a0`01c98000 00000000`0000009b : nt!MiSwitchBaseAddress+0x61
fffff880`020ad7a0 fffff800`0338210f : 00000000`00000004 00000000`00000080 00000000`01000000 00000000`01000000 : nt!MiRelocateImageAgain+0x100
fffff880`020ad7f0 fffff800`0335fc5e : fffff880`020ada40 fffff880`020adb60 00000000`00000000 fffff880`020ada38 : nt!MmCreateSection+0x2df
fffff880`020ad9f0 fffff800`03084cd3 : fffffa80`10a70060 00000000`001df3b8 fffff880`020ada88 00000000`001df548 : nt!NtCreateSection+0x171
fffff880`020ada70 00000000`77b8e07a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001df398 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b8e07a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiUnlinkPageFromLockedList+8d
fffff800`03096e5d cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiUnlinkPageFromLockedList+8d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5507a73c

IMAGE_VERSION:  6.1.7601.18798

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8d

BUCKET_ID:  X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x4e_2_nt!miunlinkpagefromlockedlist+8d

FAILURE_ID_HASH:  {03e070c3-d5fe-3ed8-ba20-3b1d3e0b8694}

Followup: MachineOwner
---------
 
Dat is een onderdeel van de W8 activator, wel vreemd want je draait W7?

En zit de laatste firmware op/in die SSD?

Ik draai inderdaad Windows 7 maar gebruik wel een aangepaste ISO met alle updates t/m Juni er al in. En Office 2013 heb ik ook geïnstalleerd.
De SSD is voorzien van de laatste firmware (070H), voor die Samsung bestaat nog geen nieuwere versie firmware.

Zou ik ergens die AutoPico.exe uit kunnen schakelen? Ik zie hem namelijk niet in mijn MSConfig of services.
 
Laatst bewerkt:
Ik heb nu net een orginele iso van Dreamspark gehaald en geïnstalleerd op de Samsung SSD 500GB. Om uit te sluiten dat die "custom" iso het probleem veroorzaakt, ik ben er namelijk achter gekomen dat beide versies van Windows 7 en 8.1 die ik had geïnstalleerd dezelfde loader gebruikte (Met die Autopico etc.).

Hierna heb ik alle drivers (behalve rapid storage) er weer opgezet. Nu weer even testen.
Het viel me trouwens direct op dat het in en uit slaapstand zetten nu instant gaat.
Komende nacht laat ik hem weer de hele nacht in slaapstand staan om te kijken of hij morgen zonder BSOD opstart.
 
Vanmorgen bij het uit slaapstand halen wilde hij niet direct opstarten, ik kreeg geen beeld. Maar de computer crashte ook niet, hij bleef gewoon lopen.
Hierop heb ik de 2 externe hardeschijven uit de USB 3.0 poorten getrokken en d.m.v. de reset knop de computer gereset. Daarna gaf hij beeld en ging hij Windows Hervatten, hij startte op in de staat waarin ik hem gesaved had zonder BSOD :).

Nu heb ik in de logboeken de volgende entry gevonden:
Er is een fout ontdekt op apparaat \Device\Harddisk2\DR2 tijdens een wisselbestandsbewerking.

Deze entry komt na:
Het systeem is uit de slaapstand gekomen.
Start van slaapstand: ‎2015‎-‎06‎-‎29T21:29:00.880707400Z
Einde van slaapstand: ‎2015‎-‎06‎-‎30T08:04:01.560801900Z
Oorzaak van einde slaapstand: Onbekend

Aangezien ik beide SSD's in mijn pc heb zitten (harddisk0 & harddisk1) ga ik ervanuit dat die externe schijf ervoor zorgde dat hij niet netjes uit slaapstand kwam. Mogelijk dat dit komt omdat hij op een USB 3.0 poort is ingestoken?

Edit:
Ik gebruik de driver: Intel Usb3.0 version 3.0.4.65 (van Gigabyte website)

Op de website van Intel is de nieuwste versie: 3.0.5.69 (https://downloadcenter.intel.com/do...Intel-8-9-Series-and-C220-C610-Chipset-Family)

Misschien dat een driver update het probleem verhelpt?
 
Laatst bewerkt:
Gisteren heb ik de nieuwe USB 3.0 driver geïnstalleerd en mijn systeem in de avond in slaapstand gezet.
Vanmorgen uit slaapstand gehaald zonder problemen maar na een paar minuten alsnog een BSOD:

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\070115-5397-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`0349a730
Debug session time: Wed Jul  1 09:30:02.583 2015 (UTC + 2:00)
System Uptime: 0 days 10:05:10.363
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa800498ae30, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+338a4 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
	contains the address of the PFN for the corrupted page table page.
	On a 32 bit OS, parameter 2 contains a pointer to the number of used
	PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa800498ae30
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41790

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80003337810 to fffff800032c78c0

STACK_TEXT:  
fffff880`0add56e8 fffff800`03337810 : 00000000`0000001a 00000000`00041790 fffffa80`0498ae30 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0add56f0 fffff800`032fb1b9 : 00000000`00000000 000007fe`f355cfff fffffa80`00000000 fffff880`00960000 : nt! ?? ::FNODOBFM::`string'+0x338a4
fffff880`0add58b0 fffff800`035dfb71 : fffffa80`10d8ce20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0add59d0 fffff800`035dff7f : 0000007f`00000000 000007fe`f3240000 fffffa80`00000001 fffffa80`1034ddc0 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0add5a90 fffff800`032c6b53 : 00000000`00000000 000007fe`f354800c fffffa80`105d3b10 000007fe`f3240000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0add5ae0 00000000`7713de5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0028a448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7713de5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+338a4
fffff800`03337810 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+338a4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  556356e8

IMAGE_VERSION:  6.1.7601.18869

FAILURE_BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+338a4

BUCKET_ID:  X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+338a4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41790_nt!_??_::fnodobfm::_string_+338a4

FAILURE_ID_HASH:  {b7b6e799-20a2-a8ed-3529-d30731685de0}

Followup: MachineOwner
---------
 
Even een update, via experts op BSOD gebied zijn we eraan uit dat het crashen komt doordat de pagetable corrupt raakt, dit verklaart ook het crashen op steeds andere bestanden. Ondanks dat de tests van het geheugen allemaal 100% in orde lijken ga ik toch geleend geheugen testen de dagen na mijn vakantie.

Ook reeds contact gehad met Gigabyte en zij kunnen het probleem niet reconstrueren dus het blijkt geen probleem met het moederbord opzich. Vrijwel de enigste opties zouden nog zijn Videokaart of RAM.

Zoals gezegd ga ik dit na mijn vakantie checken door de onboard vga te gebruiken en ander RAM erin te zetten. Ik plaats hier weer een update ;).

Evengoed bedankt iedereen voor het meedenken alvast! :thumb::)
 
Dingen die je ook kunt doen, als het geheugen bij een test goed is lijkt mij dat je het ergens anders moet zoeken.

1 SSD gebruiken en kijken of hetzelfde gebeurt, eventueel omruilen.
De pagefile/wisselbestand op 0 zetten, toch niet nodig bij een SSD en voldoende geheugen.

De slaapstand uitzetten, rebooten en opnieuw instellen indien nodig.
 
Status
Niet open voor verdere reacties.
Terug
Bovenaan Onderaan