Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


BSOD ntoskrnl.exe+6f400

  • Please log in to reply
1 reply to this topic

#1 HakunaMaTata


  • Members
  • 1 posts
  • Local time:08:35 AM

Posted 30 May 2016 - 12:38 AM

I'm at my wits end here..


I keep getting BSODs on a desktop I'm refurbing and I can't figure out WTF the problem is.


When I first got it, I did a clean install of Windows 7.


Then I added a Radeon R7 240 Graphic Card and a DLink WiFi card.


I also added 2 new sticks of RAM, a new power supply, and a new SSD HD.. but the BSODs continue..


Removed all of them, did clean installs, went one-by-one, and I'm still having the same God damn issue!


Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.23418.amd64fre.win7sp1_ldr.160408-2045
Machine Name:
Kernel base = 0xfffff800`03003000 PsLoadedModuleList = 0xfffff800`03245730
Debug session time: Sun May 29 23:49:10.409 2016 (UTC - 4:00)
System Uptime: 0 days 0:20:49.048
* *
* Bugcheck Analysis *
* *

An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff800031aa617, address which referenced memory

Debugging Details:

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2



fffff800`031aa617 48895808 mov qword ptr [rax+8],rbx



PROCESS_NAME: svchost.exe

TRAP_FRAME: fffff880083ad7f0 -- (.trap 0xfffff880083ad7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005facd10
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031aa617 rsp=fffff880083ad980 rbp=0000000000001000
r8=0000000000000000 r9=fffff80003206700 r10=fffff80003206588
r11=0000000000000717 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fffff800`031aa617 48895808 mov qword ptr [rax+8],rbx ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030719a9 to fffff80003072400

fffff880`083ad6a8 fffff800`030719a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`083ad6b0 fffff800`03070620 : fffff880`083adab0 fffff880`083adaa0 00000000`00380000 fffff800`03206700 : nt!KiBugCheckDispatch+0x69
fffff880`083ad7f0 fffff800`031aa617 : 00000000`00000000 00000000`00000000 fffffa80`05f268e0 fffff880`0121c404 : nt!KiPageFault+0x260
fffff880`083ad980 fffff880`0123ba86 : fffffa80`00000000 fffff8a0`0468e0e0 fffff880`083adb70 00000000`00000000 : nt!ExAllocatePoolWithTag+0x537
fffff880`083ada70 fffff880`0132821a : fffff8a0`0468e0e0 00000000`00000000 00000000`00000000 fffff8a0`0a514370 : Ntfs!TxfCreateTxfFoForDefaultReader+0x86
fffff880`083adaa0 fffff880`0130a40b : fffff880`083adcd0 fffff8a0`00251640 00000000`000000fc 00000000`00000702 : Ntfs!TxfReferenceTxfVscbForDefaultReader+0x9a
fffff880`083adad0 fffff880`0129c0a4 : 00000000`00000000 fffff8a0`00251640 fffff8a0`00251640 fffff880`083adcd0 : Ntfs! ?? ::NNGAKEGL::`string'+0xf392
fffff880`083adb60 fffff880`0129a706 : fffff880`083adcd0 fffffa80`06784c10 00000000`000000fc fffffa80`000000fc : Ntfs!NtfsCommonQueryInformation+0x472
fffff880`083adc30 fffff880`0129aee4 : fffff880`083adcd0 fffffa80`06784c10 fffffa80`06784c10 fffffa80`05ed2d40 : Ntfs!NtfsFsdDispatchSwitch+0x106
fffff880`083adcb0 fffff880`010d0c4c : fffffa80`0289ae74 fffffa80`067f6630 00000000`000000fc fffff800`031f1e80 : Ntfs!NtfsFsdDispatchWait+0x14
fffff880`083adea0 fffff880`010d0a40 : fffffa80`067f6630 00000000`00000000 fffffa80`02ea5030 fffffa80`019f77e0 : fltmgr!FltpQueryInformationFile+0xfc
fffff880`083adf10 fffff880`010d09bd : fffffa80`0549a2c0 00000000`00000000 fffffa80`067f6630 fffff800`03371331 : fltmgr!FltpGetFileName+0x70
fffff880`083adf60 fffff880`010d0fe0 : 00000000`00000000 fffffa80`0189b200 fffffa80`00000000 fffffa80`00000201 : fltmgr!FltpGetOpenedFileName+0x1d
fffff880`083adf90 fffff880`010d0ead : 00000000`00000000 fffffa80`0289a800 fffffa80`06523480 fffffa80`02e1bf90 : fltmgr!FltpCallOpenedFileNameHandler+0x20
fffff880`083adfd0 fffff880`010b24fb : fffffa80`0289a800 fffffa80`02a23a10 fffffa80`02696000 fffff800`03372fd8 : fltmgr!FltpCreateFileNameInformation+0x17d
fffff880`083ae030 fffff880`010cf5ef : 00000000`00004000 fffffa80`02a23a10 00000000`00000000 fffffa80`059cdf10 : fltmgr!FltpGetFileNameInformation+0x26b
fffff880`083ae0b0 fffff880`041c6bca : fffffa80`067f6630 fffffa80`059cdf10 fffffa80`0612fe90 fffff880`010cf81a : fltmgr!FltGetFileNameInformationUnsafe+0x7f
fffff880`083ae120 fffff880`010d1035 : fffffa80`059cdf10 fffff880`010b17d2 00000000`00000018 fffffa80`0612ff28 : luafv!LuafvGenerateFileName+0x82
fffff880`083ae150 fffff880`010e2d50 : 00000000`00000000 fffffa80`0612fe90 00000000`00000000 00000000`00000000 : fltmgr!FltpCallOpenedFileNameHandler+0x75
fffff880`083ae190 fffff880`010e42fe : fffff880`083b0000 fffff880`083a001a fffffa80`059eb5d8 fffffa80`059cdf10 : fltmgr!FltpExpandFilePathWorker+0x4e0
fffff880`083ae2d0 fffff880`010d6ed8 : 00000000`00000000 00000000`00000000 fffffa80`0612fe90 fffff880`083ae858 : fltmgr!FltpExpandFilePath+0x1e
fffff880`083ae300 fffff880`010d0e1e : fffffa80`0612fe90 fffff880`0121dc83 00000000`00000000 fffff8a0`00251510 : fltmgr! ?? ::NNGAKEGL::`string'+0x1ed8
fffff880`083ae340 fffff880`010bcb9d : c00000bb`00000000 00000000`00000000 fffffa80`05ed5fb0 fffff880`083b0000 : fltmgr!FltpCreateFileNameInformation+0xee
fffff880`083ae3a0 fffff880`010b6bf6 : fffffa80`02696000 fffffa80`05ed54c0 fffffa80`0289a8f8 00000000`00000000 : fltmgr!HandleStreamListNotSupported+0x15d
fffff880`083ae3e0 fffff880`010bdb44 : 00000000`00000000 00000000`00000000 fffffa80`05ed54c0 00000000`00000101 : fltmgr! ?? ::FNODOBFM::`string'+0x30f3
fffff880`083ae460 fffff880`01908e83 : fffffa80`0612fe90 fffff880`083ae7c0 fffffa80`02a2c940 00000000`00008c00 : fltmgr!FltGetFileNameInformation+0x184
fffff880`083ae4f0 fffffa80`0612fe90 : fffff880`083ae7c0 fffffa80`02a2c940 00000000`00008c00 fffff8a0`00180000 : mbamchameleon+0x6e83
fffff880`083ae4f8 fffff880`083ae7c0 : fffffa80`02a2c940 00000000`00008c00 fffff8a0`00180000 fffff880`083ae530 : 0xfffffa80`0612fe90
fffff880`083ae500 fffffa80`02a2c940 : 00000000`00008c00 fffff8a0`00180000 fffff880`083ae530 00000000`00000000 : 0xfffff880`083ae7c0
fffff880`083ae508 00000000`00008c00 : fffff8a0`00180000 fffff880`083ae530 00000000`00000000 fffffa80`02a1bb40 : 0xfffffa80`02a2c940
fffff880`083ae510 fffff8a0`00180000 : fffff880`083ae530 00000000`00000000 fffffa80`02a1bb40 fffffa80`02e1bb51 : 0x8c00
fffff880`083ae518 fffff880`083ae530 : 00000000`00000000 fffffa80`02a1bb40 fffffa80`02e1bb51 00000000`00000000 : 0xfffff8a0`00180000
fffff880`083ae520 00000000`00000000 : fffffa80`02a1bb40 fffffa80`02e1bb51 00000000`00000000 fffffa80`00bfda80 : 0xfffff880`083ae530


fffff880`041c6bca 8bd8 mov ebx,eax


SYMBOL_NAME: luafv!LuafvGenerateFileName+82



IMAGE_NAME: luafv.sys


FAILURE_BUCKET_ID: X64_0xC5_2_luafv!LuafvGenerateFileName+82

BUCKET_ID: X64_0xC5_2_luafv!LuafvGenerateFileName+82

Followup: MachineOwner



BC AdBot (Login to Remove)


#2 usasma


    Still visually handicapped (avatar is memory developed by my Dad

  • BSOD Kernel Dump Expert
  • 25,091 posts
  • Gender:Male
  • Location:Southeastern CT, USA
  • Local time:08:35 AM

Posted 30 May 2016 - 06:07 PM

Is the system infected?  I see traces of MalwareBytes in the memory dump.

If infected, I'd suggest posting over in the Am I Infected forum:  http://www.bleepingcomputer.com/forums/f/103/am-i-infected-what-do-i-do/
Please read the pinned topics at the top of the forum for instructions on how to post there.

As for the BSOD's, Please run this report collecting tool so that we can provide a complete analysis:  http://omgdebugging.com/bsod-inspector/
When done a Notepad document will open with the name of the file and it's location. (By default it'll be a .zip file located on your Desktop)
Simply upload the .zip file with your next post and we'll move on from there.

If it doesn't work for you, then please try this:  http://www.bleepingcomputer.com/forums/t/576314/blue-screen-of-death-bsod-posting-instructions-windows-10-81-8-7-vista/


My browser caused a flood of traffic, sio my IP address was banned. Hope to fix it soon. Will get back to posting as soon as Im able.

- John  (my website: http://www.carrona.org/ )**If you need a more detailed explanation, please ask for it. I have the Knack. **  If I haven't replied in 48 hours, please send me a message. My eye problems have recently increased and I'm having difficult reading posts. (23 Nov 2017)FYI - I am completely blind in the right eye and ~30% blind in the left eye.<p>If the eye problems get worse suddenly, I may not be able to respond.If that's the case and help is needed, please PM a staff member for assistance.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users