Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Bluescreening again!


26 Aug 2010   #1

Windows 7
 
 
Bluescreening again!

Hi,

You guys helped me out before and cured my bluescreens for about 3 months. But now there back with a vengeance.

I honestly think it's down to hardware, as no .sys files are appearing. I dont get a error message, and my screen goes crazy whenever I get one.

My laptop then doesn't POST, and the fan just spins..

Thanks for help!

Dan.


My System SpecsSystem Spec
.

26 Aug 2010   #2

Windows 7 Ultimate 32 bit
 
 

Your crashes are hardware related and the dumps point to memory corruption.

Error Code 8E, KERNEL_MODE_EXCEPTION_NOT_HANDLED_M - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint in startup without having a debugger attached, Hardware incompatibility, Faulty system service, 3rd party remote control, Memory

Error code 24, NTFS_FILE_SYSTEM - Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure

Error code A, IRQL_NOT_LESS_OR_EQUAL - Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility


Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082610-22401-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a4c000 PsLoadedModuleList = 0x82b94810
Debug session time: Thu Aug 26 15:17:45.914 2010 (GMT-4)
System Uptime: 0 days 0:27:43.740
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 82a8f44a, b40e3cc0, 0}

Probably caused by : ntkrpamp.exe ( nt!KiFastCallEntry+12a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a8f44a, The address that the exception occurred at
Arg3: b40e3cc0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiFastCallEntry+12a
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1

TRAP_FRAME:  b40e3cc0 -- (.trap 0xffffffffb40e3cc0)
ErrCode = 00000000
eax=00000000 ebx=82c7d48f ecx=82c7d59b edx=746c6644 esi=097efa24 edi=00000d28
eip=82a8f44a esp=b40e3d34 ebp=00000001 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!KiFastCallEntry+0x12a:
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1       ss:0010:0000006d=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  msnmsgr.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 00000000 to 82a8f44a

STACK_TEXT:  
00000001 00000000 00000000 00000000 00000000 nt!KiFastCallEntry+0x12a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiFastCallEntry+12a
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiFastCallEntry+12a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

FAILURE_BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a

BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a

Followup: MachineOwner
---------

1: kd> lmtsmn
start    end        module name
8afad000 8aff5000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
920cc000 920dc000   AcpiVpc  AcpiVpc.sys  Tue Jan 12 17:18:24 2010 (4B4CF530)
9083a000 90894000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
921a2000 921b4000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b1a8000 8b1b1000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
9214a000 92183000   amfj1r3f amfj1r3f.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
9210a000 92137000   Apfiltr  Apfiltr.sys  Fri Mar 14 08:23:10 2008 (47DA6E2E)
9b119000 9b122000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
8b164000 8b16d000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b16d000 8b190000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
990b0000 990fd000   ATMFD    ATMFD.DLL    Wed May 26 23:49:36 2010 (4BFDEBD0)
92090000 920cc000   b57nd60x b57nd60x.sys Sun Apr 26 07:15:34 2009 (49F44256)
8aded000 8adf8000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
91e1f000 92086000   bcmwl6   bcmwl6.sys   Tue Jul 07 20:44:47 2009 (4A53EBFF)
9038a000 90391000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
909ce000 909dc000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8acb5000 8acbd000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9991c000 99935000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
99090000 990ae000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
90307000 90326000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
9127c000 912f4000   CHDRT32  CHDRT32.sys  Mon Jun 15 13:46:19 2009 (4A3688EB)
8acff000 8adaa000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b592000 8b5b7000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8acbd000 8acff000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
920dc000 920df700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
90349000 90383000   cmdguard cmdguard.sys Fri Jun 04 05:53:51 2010 (4C08CD2F)
8b5c2000 8b5cc000   cmdhlp   cmdhlp.sys   Tue Jun 01 13:38:58 2010 (4C0545B2)
8b387000 8b3e4000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
8ade5000 8aded000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
92195000 921a2000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
91379000 91386000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
909b6000 909ce000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
909aa000 909b6000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b600000 8b611000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
91323000 9133c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
91386000 91397000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
90217000 902f1000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
91397000 913a1000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
91c5b000 91d12000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
91d12000 91d4b000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
8b1e5000 8b1f6000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b1b1000 8b1e5000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b3f2000 8b3fb000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b560000 8b592000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b75d000 8b78e000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
92144000 92149280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
8b7ef000 8b7ef680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
82a15000 82a4c000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
999d8000 999e2000   hcmon    hcmon.sys    Fri May 21 01:53:58 2010 (4BF61FF6)
91db0000 91dcf000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
99897000 9991c000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b7e7000 8b7ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
920e0000 920f8000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8b08a000 8b164000   iaStor   iaStor.sys   Thu Jun 04 21:42:33 2009 (4A287809)
91634000 91c5b000   igdkmd32 igdkmd32.sys Fri Nov 06 17:53:52 2009 (4AF4A900)
9090f000 90924000   inspect  inspect.sys  Tue Jun 01 13:38:29 2010 (4C054595)
92183000 92195000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
920f8000 92105000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bc7000 80bcf000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
90800000 90834000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
8b374000 8b387000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b50e000 8b533000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
91200000 91210000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
913ac000 913c7000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8ac2c000 8aca4000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
913a1000 913ac000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
92137000 92144000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b074000 8b08a000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
90326000 90349000   MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
9b3b5000 9b3bde00   MpNWMon  MpNWMon.sys  Sat Mar 20 00:03:24 2010 (4BA4490C)
99935000 99947000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
99947000 9996a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
9996a000 999a5000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
999a5000 999c0000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8b190000 8b19a000   msahci   msahci.sys   Mon Jul 13 19:45:50 2009 (4A5BC72E)
903e3000 903ee000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8aff5000 8affd000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b349000 8b374000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
909a0000 909aa000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b7d7000 8b7e7000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b419000 8b4d0000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
921cc000 921d7000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
99874000 99884000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
921d7000 921f9000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
9126b000 9127c000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
90924000 90932000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
90894000 908c6000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b4d0000 8b50e000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
903ee000 903fc000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
90996000 909a0000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a4c000 82e5c000   nt       ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF)
8b21a000 8b349000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
90383000 9038a000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
9982e000 99874000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
908d6000 908f5000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8add4000 8ade5000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
8adaa000 8add4000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b19a000 8b1a8000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
91600000 9160b900   pcouffin pcouffin.sys Tue Dec 05 09:39:53 2006 (457584B9)
8b3e4000 8b3f2000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9b2dd000 9b374000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
912f4000 91323000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
8aca4000 8acb5000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8b1f6000 8b1ff200   PxHelp20 PxHelp20.sys Wed Mar 12 21:57:44 2008 (47D88A18)
921b4000 921cc000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
91e00000 91e18000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
91dcf000 91de6000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
91de6000 91dfd000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
90955000 90996000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
903cb000 903d3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
903d3000 903db000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
903db000 903e3000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b533000 8b560000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
99884000 99897000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8af87000 8afad000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
9b374000 9b37e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
8b7d5000 8b7d6480   speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
8b7cd000 8b7d5000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
8ae8b000 8af7e000   sptd     sptd.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
9b05e000 9b0af000   srv      srv.sys      Tue Dec 08 03:05:37 2009 (4B1E08D1)
9b00f000 9b05e000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
9b37e000 9b39f000   srvnet   srvnet.sys   Tue Dec 08 03:05:06 2009 (4B1E08B2)
91e18000 91e19380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8b614000 8b75d000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
9b39f000 9b3ac000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8b5b7000 8b5c2000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
90200000 90217000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
90945000 90955000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
99060000 99069000   TSDDD    TSDDD.dll    unavailable (00000000)
909dc000 909fd000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
9160c000 9161a000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
9133c000 91353000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
91353000 91354700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
91da1000 91db0000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
91227000 9126b000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
91d56000 91da1000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
91d4b000 91d56000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
91355000 91378b00   usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
8ae00000 8ae0b000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
90906000 9090f000   vfilter  vfilter.sys  Wed Nov 18 19:06:18 2009 (4B048BFA)
90391000 9039d000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
9039d000 903be000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
999e2000 999f1a00   vmci     vmci.sys     Fri May 21 01:21:04 2010 (4BF61840)
92105000 92109600   VMkbd    VMkbd.sys    Fri May 21 02:43:42 2010 (4BF62B9E)
913ef000 913f1f00   VMNET    VMNET.SYS    Mon Aug 10 08:03:57 2009 (4A800CAD)
913e1000 913ef000   vmnetbridge vmnetbridge.sys Mon Aug 10 08:05:29 2009 (4A800D09)
9b3ac000 9b3b0c80   vmnetuserif vmnetuserif.sys Fri May 21 02:07:27 2010 (4BF6231F)
9b20e000 9b2dce00   vmx86    vmx86.sys    Fri May 21 03:30:41 2010 (4BF636A1)
8ac00000 8ac10000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b029000 8b074000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8b78e000 8b7cd000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
9b3b1000 9b3b4d80   vstor2_ws60 vstor2-ws60.sys Tue Apr 27 19:16:24 2010 (4BD77048)
92086000 92090000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
908f5000 90906000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
90932000 90945000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
903be000 903cb000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8ae0c000 8ae7d000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ae7d000 8ae8b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
908cf000 908d6000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
98e00000 9904a000   win32k   win32k.sys   Sat May 01 10:49:02 2010 (4BDC3F5E)
8af7e000 8af87000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
908c6000 908cf000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 19:55:01 2009 (4A5BC955)
913c7000 913e1000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
9b0af000 9b119000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
999c0000 999d8000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8b7f0000 8b7fd000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
9021c000 902f6000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
902f6000 90307000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082510-20982-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c39000 PsLoadedModuleList = 0x82d81810
Debug session time: Wed Aug 25 17:18:11.128 2010 (GMT-4)
System Uptime: 0 days 0:01:25.954
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
0: kd> !Analyze
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, 9a47322c, 9a472e10, 4566744e}

Unable to load image \SystemRoot\System32\DRIVERS\cmdguard.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cmdguard.sys
*** ERROR: Module load completed but symbols could not be loaded for cmdguard.sys
Probably caused by : Ntfs.sys ( Ntfs!ExAllocateFromNPagedLookasideList+27 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 001904fb
Arg2: 9a47322c
Arg3: 9a472e10
Arg4: 4566744e

Debugging Details:
------------------


EXCEPTION_RECORD:  9a47322c -- (.exr 0xffffffff9a47322c)
ExceptionAddress: 4566744e
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000008
   Parameter[1]: 4566744e
Attempt to execute non-executable address 4566744e

CONTEXT:  9a472e10 -- (.cxr 0xffffffff9a472e10)
eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=8b449d00 edi=00000001
eip=4566744e esp=9a4732f4 ebp=9a473308 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
4566744e ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  00000008

EXCEPTION_PARAMETER2:  4566744e

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82da1718
Unable to read MiSystemVaType memory at 82d81160
 4566744e 

FOLLOWUP_IP: 
Ntfs!ExAllocateFromNPagedLookasideList+27
8b417920 5e              pop     esi

FAULTING_IP: 
+5cfd952f01fcdcf0
4566744e ??              ???

FAILED_INSTRUCTION_ADDRESS: 
+5cfd952f01fcdcf0
4566744e ??              ???

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from 8b417920 to 4566744e

STACK_TEXT:  
WARNING: Frame IP not in any known module. Following frames may be wrong.
9a4732f0 8b417920 00000011 000000b8 0000001a 0x4566744e
9a473308 8b4b0d49 8b449d00 1103bed1 983ee7d0 Ntfs!ExAllocateFromNPagedLookasideList+0x27
9a473418 8b497327 87db57e8 9a3ab3c0 983ee7d0 Ntfs!NtfsRestartIndexEnumeration+0x47
9a473624 8b4b5783 87db57e8 883d5588 86d870d8 Ntfs!NtfsQueryDirectory+0x6d0
9a473658 8b4b54fa 87db57e8 9a3ab3c0 1103bc09 Ntfs!NtfsCommonDirectoryControl+0x21d
9a4736c0 82c754bc 86d87020 883d5588 883d5588 Ntfs!NtfsFsdDirectoryControl+0xf7
9a4736d8 8b3a120c 00000000 8725be40 00000000 nt!IofCallDriver+0x63
9a4736fc 8b3a20bf 9a47371c 86d847e0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
9a473734 8b3b7085 87d3da50 00000000 9a4737a8 fltmgr!FltPerformSynchronousIo+0xb9
9a473744 9022da5a 87d3da50 8725be40 9aab3c00 fltmgr!FltQueryDirectoryFile+0x9d
9a4737a8 8b3baa8c 87d3da50 8849cb68 80001250 luafv!LuafvNormalizeNameComponentEx+0xa8
9a4737d8 8b3baeb6 883b9108 00000000 883b9108 fltmgr!FltpCallNormalizeNameComponentHandler+0x4e
9a473804 8b3bbdf4 013b9108 881e1868 883b9108 fltmgr!FltpExpandShortNames+0x138
9a473820 8b3bc505 883b0000 881e1868 883b283c fltmgr!FltpGetNormalizedFileNameWorker+0xae
9a473838 8b3b9765 883b9108 881e1868 883b9108 fltmgr!FltpGetNormalizedFileName+0x19
9a473850 8b3a3773 883b9108 00000000 883b9108 fltmgr!FltpCreateFileNameInformation+0x81
9a473870 8b3a38c7 86d86e98 00000000 00000000 fltmgr!HandleStreamListNotSupported+0x125
9a4738a0 8b3a3fa3 c00000bb 87d35bb8 88403008 fltmgr!FltpGetFileNameInformation+0xc7
9a4738c8 9034dd25 001e1870 00000101 9a473924 fltmgr!FltGetFileNameInformation+0x12b
9a47391c 9033966e 881e1870 9a47394c 9a473998 cmdguard+0x1dd25
9a47392c 8b39daeb 881e1870 9a47394c 9a473978 cmdguard+0x966e
9a473998 8b3a09f0 9a4739dc 883d3c38 00000000 fltmgr!FltpPerformPreCallbacks+0x34d
9a4739b0 8b3b41fe 9a4739dc 8b3b7f3c 00000000 fltmgr!FltpPassThroughInternal+0x40
9a4739c4 8b3b48b7 9a4739dc 883d3c38 8849cb68 fltmgr!FltpCreateInternal+0x24
9a473a08 82c754bc 86d847e0 86d86ae0 8849cbc4 fltmgr!FltpCreate+0x2c9
9a473a20 82e796ad be028b8b 9a473bc8 00000000 nt!IofCallDriver+0x63
9a473af8 82e5a26b 86d36bb0 8559d298 880f3d20 nt!IopParseDevice+0xed7
9a473b74 82e802d9 00000000 9a473bc8 00000040 nt!ObpLookupObjectName+0x4fa
9a473bd0 82e7862b 01eeeb8c 8559d298 9a470001 nt!ObOpenObjectByName+0x165
9a473c4c 82e83f42 01eeebe8 80100080 01eeeb8c nt!IopCreateFile+0x673
9a473c98 9033d2e6 01eeebe8 80100080 01eeeb8c nt!NtCreateFile+0x34
9a473d00 82c7c44a 01eeebe8 80100080 01eeeb8c cmdguard+0xd2e6
9a473d00 777864f4 01eeebe8 80100080 01eeeb8c nt!KiFastCallEntry+0x12a
01eeebf0 00000000 00000000 00000000 00000000 0x777864f4


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!ExAllocateFromNPagedLookasideList+27

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45

STACK_COMMAND:  .cxr 0xffffffff9a472e10 ; kb

FAILURE_BUCKET_ID:  0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27

BUCKET_ID:  0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\071810-19110-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a15000 PsLoadedModuleList = 0x82b5d810
Debug session time: Sun Jul 18 11:51:08.454 2010 (GMT-4)
System Uptime: 0 days 2:39:50.280
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {905fc0f, 2, 0, 82b07b40}

Probably caused by : ntkrpamp.exe ( nt!PpmPerfRecordUtility+af )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0905fc0f, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82b07b40, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82b7d718
Unable to read MiSystemVaType memory at 82b5d160
 0905fc0f 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!PpmPerfRecordUtility+af
82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  82b3ba14 -- (.trap 0xffffffff82b3ba14)
ErrCode = 00000000
eax=0000c679 ebx=00000000 ecx=0905fbf3 edx=00000004 esi=82b3ed20 edi=00000000
eip=82b07b40 esp=82b3ba88 ebp=82b3bad0 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!PpmPerfRecordUtility+0xaf:
82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch] ds:0023:0905fc0f=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82b07b40 to 82a5b82b

STACK_TEXT:  
82b3ba14 82b07b40 badb0d00 00000004 fffffffe nt!KiTrap0E+0x2cf
82b3bad0 82b070b7 82b3bba0 00000000 82b48280 nt!PpmPerfRecordUtility+0xaf
82b3bb10 82b06f6d 82b06f02 00000000 00000000 nt!PpmCheckRecordAllUtility+0xd2
82b3bb14 82b06f02 00000000 00000000 00000000 nt!PpmCheckRun+0x5a
82b3bb38 82a7f04d 82b4cc58 00000000 09ab8dd9 nt!PpmCheckStart+0x4d
82b3bb7c 82a7eff1 82b3ed20 82b3bca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b3bc68 82a7eeae 82b3ed20 82b3bca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b3bcdc 82a7d20e 00096165 8549d5c0 82b48280 nt!KiTimerExpiration+0x25c
82b3bd20 82a7d038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b3bd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!PpmPerfRecordUtility+af
82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!PpmPerfRecordUtility+af

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

FAILURE_BUCKET_ID:  0xA_nt!PpmPerfRecordUtility+af

BUCKET_ID:  0xA_nt!PpmPerfRecordUtility+af

Followup: MachineOwner
---------
Please run Memtest 86 to test your RAM.

RAM - Test with Memtest86+

Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

While you are troubleshooting, I recommend that you uninstall Comodo using the Comodo uninstall tool. Turn Windows Firewall on. You can reinstall Comodo once you have your system running smoothly and try it.

What antivirus are you using?

I also find some old drivers. Out of date drivers can and do corrupt memory and causes crashes. Up dtate these driver or uninstall the obsolete software. The drivers in red font are way obsolete.
Quote:
Apfiltr.sys Fri Mar 14 08:23:10 2008
b57nd60x.sys Sun Apr 26 07:15:34 2009
bcmwl6.sys Tue Jul 07 20:44:47 2009
CHDRT32.sys Mon Jun 15 13:46:19 2009
giveio.sys Wed Apr 03 22:33:25 1996
iaStor.sys Thu Jun 04 21:42:33 2009
pcouffin.sys Tue Dec 05 09:39:53 2006
PxHelp20.sys Wed Mar 12 21:57:44 2008
If you need help updating your drivers, please post back.

My System SpecsSystem Spec
26 Aug 2010   #3

Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
 
 

Hello and Welcome !

Seems like lot of old drivers are causing the problem. First thing is removing Duplex driver i.e. sptd.sys check this article DuplexSecure - FAQ

Go to C:\Windows\System32\Drivers and rename giveio.sys to giveio.old and reboot the System because it's dated 1996 which is very dangerous.

Update the Drivers

Code:
pcouffin.sys Tue Dec 05 20:09:53 2006
PxHelp20.sys Thu Mar 13 07:27:44 2008
Apfiltr.sys  Fri Mar 14 17:53:10 2008
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a8f44a, The address that the exception occurred at
Arg3: b40e3cc0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!KiFastCallEntry+12a
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1

TRAP_FRAME:  b40e3cc0 -- (.trap 0xffffffffb40e3cc0)
ErrCode = 00000000
eax=00000000 ebx=82c7d48f ecx=82c7d59b edx=746c6644 esi=097efa24 edi=00000d28
eip=82a8f44a esp=b40e3d34 ebp=00000001 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!KiFastCallEntry+0x12a:
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1       ss:0010:0000006d=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  msnmsgr.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 00000000 to 82a8f44a

STACK_TEXT:  
00000001 00000000 00000000 00000000 00000000 nt!KiFastCallEntry+0x12a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiFastCallEntry+12a
82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiFastCallEntry+12a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf

FAILURE_BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a

BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a
Hope this helps,
Captain
My System SpecsSystem Spec
.


26 Aug 2010   #4

Windows 7
 
 

giveio.old - Isn't it used by SpeedFan?
My System SpecsSystem Spec
26 Aug 2010   #5

Windows Server 2008 R2
 
 

Actually, I think it's less sinister than that, although probably no less frustrating:
Code:
0: kd> k
ChildEBP RetAddr  
9a472cb4 8b41e221 nt!KeBugCheckEx+0x1e
9a472cdc 8b4b551b Ntfs!NtfsExceptionFilter+0xad
9a472ce8 8b416b88 Ntfs!NtfsFsdDirectoryControl+0x118
9a472cfc 8b4204c3 Ntfs!_EH4_CallFilterFunc+0x12
9a472d24 82ca1822 Ntfs!_except_handler4+0x8e
9a472d48 82ca17f4 nt!ExecuteHandler2+0x26
9a472e00 82cf6352 nt!ExecuteHandler+0x24
9a473210 82c7d036 nt!KiDispatchException+0x17c
9a473278 82c7cfea nt!CommonDispatchException+0x4a
9a4732f0 8b417920 nt!Kei386EoiHelper+0x192
9a473308 8b4b0d49 Ntfs!ExAllocateFromNPagedLookasideList+0x27
9a473418 8b497327 Ntfs!NtfsRestartIndexEnumeration+0x47
9a473624 8b4b5783 Ntfs!NtfsQueryDirectory+0x6d0
9a473658 8b4b54fa Ntfs!NtfsCommonDirectoryControl+0x21d
9a4736c0 82c754bc Ntfs!NtfsFsdDirectoryControl+0xf7
9a4736d8 8b3a120c nt!IofCallDriver+0x63
9a4736fc 8b3a20bf fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
9a473734 8b3b7085 fltmgr!FltPerformSynchronousIo+0xb9
9a473744 9022da5a fltmgr!FltQueryDirectoryFile+0x9d
9a4737a8 8b3baa8c luafv!LuafvNormalizeNameComponentEx+0xa8
9a4737d8 8b3baeb6 fltmgr!FltpCallNormalizeNameComponentHandler+0x4e
9a473804 8b3bbdf4 fltmgr!FltpExpandShortNames+0x138
9a473820 8b3bc505 fltmgr!FltpGetNormalizedFileNameWorker+0xae
9a473838 8b3b9765 fltmgr!FltpGetNormalizedFileName+0x19
9a473850 8b3a3773 fltmgr!FltpCreateFileNameInformation+0x81
9a473870 8b3a38c7 fltmgr!HandleStreamListNotSupported+0x125
9a4738a0 8b3a3fa3 fltmgr!FltpGetFileNameInformation+0xc7
*** WARNING: Unable to verify timestamp for cmdguard.sys
*** ERROR: Module load completed but symbols could not be loaded for cmdguard.sys
9a4738c8 9034dd25 fltmgr!FltGetFileNameInformation+0x12b
WARNING: Stack unwind information not available. Following frames may be wrong.
9a47391c 9033966e cmdguard+0x1dd25
9a47392c 8b39daeb cmdguard+0x966e
9a473998 8b3a09f0 fltmgr!FltpPerformPreCallbacks+0x34d
9a4739b0 8b3b41fe fltmgr!FltpPassThroughInternal+0x40
9a4739c4 8b3b48b7 fltmgr!FltpCreateInternal+0x24
9a473a08 82c754bc fltmgr!FltpCreate+0x2c9
9a473a20 82e796ad nt!IofCallDriver+0x63
9a473af8 82e5a26b nt!IopParseDevice+0xed7
9a473b74 82e802d9 nt!ObpLookupObjectName+0x4fa
9a473bd0 82e7862b nt!ObOpenObjectByName+0x165
9a473c4c 82e83f42 nt!IopCreateFile+0x673
9a473c98 9033d2e6 nt!NtCreateFile+0x34
9a473d00 82c7c44a cmdguard+0xd2e6
9a473d00 777864f4 nt!KiFastCallEntry+0x12a
01eeebf0 00000000 0x777864f4
The Comodo driver predates Windows 7 - are we sure this version is Windows 7 compatible (and not just Vista compatible)? Also, this stack is passing through LUA file virtualization, so driver verifier if this is the latest version is probably your next step.
My System SpecsSystem Spec
26 Aug 2010   #6

Windows 7 Ultimate 32 bit
 
 

Here is some driver help.

Apfiltr.sys - Alps Pointing-device Driver or Alps Touch Pad Driver belongs to the software Alps Pointing-device Driver for Windows 2000/XP or Alps Touch Pad Filter Driver for Windows 2000/XP or Alps Touch Pad Driver for Windows 2000/XP or Alps Pointing-device Filter Driver by Alps Electric Co., Ltd (www.alps.com).

b57nd60x.sys - Broadcom NetXtreme Gigabit Ethernet NDIS6.0 DriverBroadcom.com - Downloads & Support

bcmwl6.sys - Broadcom 802.11g Network Adapter driver Broadcom.com - Downloads & Support

CHDRT32.sys - Conexant High Definition SmartAudioConexant: Support

giveio.sys - ADC Analyzer/SwiftForth/Disspy - ?SpeedFan? I/O Port Programming with Delphi and NT. This software is obsolete. Uninstall it and make sure this driver is gone.

iaStor.sys - Intel Storage drivers http://downloadcenter.intel.com/Default.aspx

pcouffin.sys - Patin-Couffin low level access layer for CD devices or low level access layer for CD/DVD/BD devices or VSO Software pcouffin belongs to the software Low level access layer for CD devices or Patin couffin engine or VSO Software pcouffin by VSO Software (www.vso-software.fr). Uninstall this software. It is obsolete.

PxHelp20.sys -A part of:
Quote:
RecordNow!
ESSSONIC
Sonic RecordNow!/Sonic_PrimoSDK
Dell Media Experience
Pioneer RecordNow DX
Sonic MyDVD/RecordNow!/RecordNow DX/MyDVD Plus/PrimoSDK
Microsoft Plus! Digital Media/Digital Image Suite
Corel Photo Album
HP RecordNow/DigitalMedia Archive
IBM RecordNow!
Roxio Easy Media Creator/RecordNow Copy/Drag-to-Disc/Creator Basic v/Media Manager/CinePlayer
Adobe Photoshop Lightroom
Yahoo! Music Jukebox or Roxio
Napster Burn Engine
1CLICK DivxToDVD
OLYMPUS muvee theaterPack
by Sonic Solutions (www.sonic.com) or VERITAS Software, Inc (www.veritas.com).
Unistall the software related to this driver or disable the driver, which will break the program. Navigate to C:\Windows\System32\Drivers. Findpcouffin.sys in the Driver folder and rename it to pcouffin.bak. Reboot. You can always rename it back to .sys later.

I hope this assists you with your drivers.
My System SpecsSystem Spec
26 Aug 2010   #7

Windows 7 Ultimate 32 bit
 
 

Quote   Quote: Originally Posted by Povall54 View Post
giveio.old - Isn't it used by SpeedFan?
It may be. If so, it is an old version of Speedfan. Uninstall the old version of Speedfan , download and install an updated version. I think the newest version of Speed fan has a 2006 driver. Though old, the 2006 driver works well with Win 7. A 1996 driver is an XP driver.

What antivirus are you using?
My System SpecsSystem Spec
26 Aug 2010   #8

Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
 
 

As cluberti and one of our finest BSOD Analyst zigzag3143 mentioned uninstall Comodo Internet security and run the Comodo uninstaller check these articles How to uninstall Comodo Firewall? and Uinstall Comodo Internet Security —How To Easily Uninstall Comodo Internet Security From Your Computer? | Computer Security Articles

Hope this helps,
Captain
My System SpecsSystem Spec
26 Aug 2010   #9

Windows 7 Ultimate 32 bit
 
 

That makes three of us recommending that you uninstall Comodo. I mentioned it my first post. One of the dumps indicated a Comodo driver.
My System SpecsSystem Spec
26 Aug 2010   #10

Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
That makes three of us recommending that you uninstall Comodo. I mentioned it my first post. One of the dumps indicated a Comodo driver.
Sorry Carl i didn't see that one your post.
My System SpecsSystem Spec
Reply

 Bluescreening again!




Thread Tools



Similar help and support threads for2: Bluescreening again!
Thread Forum
Dell laptops bluescreening when using usb kensington adapter BSOD Help and Support
Solved Computer keeps freezing or bluescreening (Win7 Home x64). Help??? BSOD Help and Support
Bluescreening BSOD Help and Support
BlueScreening BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 09:12 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33