Sad BSOD when plugging in USB CDMA Modem


  1. Posts : 404
    Dual Booting Windows 7 64-Bit Ultimate Edition and Fedora 16.
       #1

    Sad BSOD when plugging in USB CDMA Modem


    Hello,

    I just purchased a USB modem (CDMA based), it is working fine on my PC, but when i tried it on my Alienware M15X, whenever i try to make a connection, a BSOD appears.

    Attached the zip file.

    - x86 (32-bit) or x64 ?
    x64
    - the original installed OS on the system?
    no
    - an OEM or full retail version?
    OEM
    - OEM = came pre-installed on system
    - Full Retail = you purchased it from retailer

    - What is the age of system (hardware)?
    1yr 2months
    - What is the age of OS installation (have you re-installed the OS?)
    2 weeks

    And Finally these are the specs..

    Windows 7 Ultimate
    intel core i7-820Qm [Clarksfield]
    Nvidia GeForce GTX260M @266.58 driver version!
    tsst corp-dvdrw
    8Gb rAM @1333mHZ
    500GB seagate Momentus Xt

    Alienware M15X

    YBL
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

       Information
    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads
    You can use MagicDisc as an alternative.
    Code:
    Code:
    sptd.sys        fffff880`00ed8000    fffff880`00ffe000    0x00126000    0x4ad24632    12/10/2009 00:55:14
    Seems like the crash has caused by connctfy.sys i.e Connectify - Turn your Windows 7 laptop into a Wi-Fi Hotspot i would recommend to uninstall it completely.
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {3f8, 2, 0, fffff80002c86e90}
    
    Unable to load image \SystemRoot\system32\DRIVERS\connctfy.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for connctfy.sys
    *** ERROR: Module load completed but symbols could not be loaded for connctfy.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for ndis.sys - 
    Probably caused by : connctfy.sys ( connctfy+39bc )
    
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000003f8, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002c86e90, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec60e0
     00000000000003f8 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!memcpy+250
    fffff800`02c86e90 488b440af8      mov     rax,qword ptr [rdx+rcx-8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff8800afda0b0 -- (.trap 0xfffff8800afda0b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa800bbcf010 rbx=0000000000000000 rcx=fffffa800bbcf438
    rdx=0000057ff4430fc8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c86e90 rsp=fffff8800afda248 rbp=fffffa80074e31a0
     r8=0000000000000400  r9=0000000000000020 r10=fffff80002e1d888
    r11=fffffa800bbcf038 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    nt!memcpy+0x250:
    fffff800`02c86e90 488b440af8      mov     rax,qword ptr [rdx+rcx-8] ds:0006:00000000`000003f8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c8f469 to fffff80002c8ff00
    
    STACK_TEXT:  
    fffff880`0afd9f68 fffff800`02c8f469 : 00000000`0000000a 00000000`000003f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0afd9f70 fffff800`02c8e0e0 : fffffa80`092531a0 fffff880`0afda748 fffffa80`092531a0 fffff880`01689aed : nt!KiBugCheckDispatch+0x69
    fffff880`0afda0b0 fffff800`02c86e90 : fffff880`04c3f9bc ffff0000`0b9b9142 fffff800`63416d4d 00000000`00001000 : nt!KiPageFault+0x260
    fffff880`0afda248 fffff880`04c3f9bc : ffff0000`0b9b9142 fffff800`63416d4d 00000000`00001000 00000000`00000028 : nt!memcpy+0x250
    fffff880`0afda250 ffff0000`0b9b9142 : fffff800`63416d4d 00000000`00001000 00000000`00000028 fffffa80`0bbcf010 : connctfy+0x39bc
    fffff880`0afda258 fffff800`63416d4d : 00000000`00001000 00000000`00000028 fffffa80`0bbcf010 ffffffff`ffffffff : 0xffff0000`0b9b9142
    fffff880`0afda260 00000000`00001000 : 00000000`00000028 fffffa80`0bbcf010 ffffffff`ffffffff fffffa80`0acab870 : 0xfffff800`63416d4d
    fffff880`0afda268 00000000`00000028 : fffffa80`0bbcf010 ffffffff`ffffffff fffffa80`0acab870 fffff880`0afda748 : 0x1000
    fffff880`0afda270 fffffa80`0bbcf010 : ffffffff`ffffffff fffffa80`0acab870 fffff880`0afda748 00000000`40010008 : 0x28
    fffff880`0afda278 ffffffff`ffffffff : fffffa80`0acab870 fffff880`0afda748 00000000`40010008 fffff880`04c3e32d : 0xfffffa80`0bbcf010
    fffff880`0afda280 fffffa80`0acab870 : fffff880`0afda748 00000000`40010008 fffff880`04c3e32d fffff880`01663110 : 0xffffffff`ffffffff
    fffff880`0afda288 fffff880`0afda748 : 00000000`40010008 fffff880`04c3e32d fffff880`01663110 00000000`00000000 : 0xfffffa80`0acab870
    fffff880`0afda290 00000000`40010008 : fffff880`04c3e32d fffff880`01663110 00000000`00000000 fffffa80`092531a0 : 0xfffff880`0afda748
    fffff880`0afda298 fffff880`04c3e32d : fffff880`01663110 00000000`00000000 fffffa80`092531a0 fffffa80`09253f68 : 0x40010008
    fffff880`0afda2a0 fffff880`01663110 : 00000000`00000000 fffffa80`092531a0 fffffa80`09253f68 fffffa80`092531a0 : connctfy+0x232d
    fffff880`0afda2a8 00000000`00000000 : fffffa80`092531a0 fffffa80`09253f68 fffffa80`092531a0 fffff880`0168710c : ndis!NdisFRegisterFilterDriver+0xfc00
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    connctfy+39bc
    fffff880`04c3f9bc ??              ???
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  connctfy+39bc
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: connctfy
    
    IMAGE_NAME:  connctfy.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bfe3927
    
    FAILURE_BUCKET_ID:  X64_0xA_connctfy+39bc
    
    BUCKET_ID:  X64_0xA_connctfy+39bc
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 404
    Dual Booting Windows 7 64-Bit Ultimate Edition and Fedora 16.
    Thread Starter
       #3

    yowanvista said:
       Information
    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads
    You can use MagicDisc as an alternative.
    Code:
    Code:
    sptd.sys        fffff880`00ed8000    fffff880`00ffe000    0x00126000    0x4ad24632    12/10/2009 00:55:14
    Seems like the crash has caused by connctfy.sys i.e Connectify - Turn your Windows 7 laptop into a Wi-Fi Hotspot i would recommend to uninstall it completely.
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {3f8, 2, 0, fffff80002c86e90}
    
    Unable to load image \SystemRoot\system32\DRIVERS\connctfy.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for connctfy.sys
    *** ERROR: Module load completed but symbols could not be loaded for connctfy.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for ndis.sys - 
    Probably caused by : connctfy.sys ( connctfy+39bc )
    
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000003f8, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002c86e90, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec60e0
     00000000000003f8 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!memcpy+250
    fffff800`02c86e90 488b440af8      mov     rax,qword ptr [rdx+rcx-8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff8800afda0b0 -- (.trap 0xfffff8800afda0b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa800bbcf010 rbx=0000000000000000 rcx=fffffa800bbcf438
    rdx=0000057ff4430fc8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002c86e90 rsp=fffff8800afda248 rbp=fffffa80074e31a0
     r8=0000000000000400  r9=0000000000000020 r10=fffff80002e1d888
    r11=fffffa800bbcf038 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    nt!memcpy+0x250:
    fffff800`02c86e90 488b440af8      mov     rax,qword ptr [rdx+rcx-8] ds:0006:00000000`000003f8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c8f469 to fffff80002c8ff00
    
    STACK_TEXT:  
    fffff880`0afd9f68 fffff800`02c8f469 : 00000000`0000000a 00000000`000003f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0afd9f70 fffff800`02c8e0e0 : fffffa80`092531a0 fffff880`0afda748 fffffa80`092531a0 fffff880`01689aed : nt!KiBugCheckDispatch+0x69
    fffff880`0afda0b0 fffff800`02c86e90 : fffff880`04c3f9bc ffff0000`0b9b9142 fffff800`63416d4d 00000000`00001000 : nt!KiPageFault+0x260
    fffff880`0afda248 fffff880`04c3f9bc : ffff0000`0b9b9142 fffff800`63416d4d 00000000`00001000 00000000`00000028 : nt!memcpy+0x250
    fffff880`0afda250 ffff0000`0b9b9142 : fffff800`63416d4d 00000000`00001000 00000000`00000028 fffffa80`0bbcf010 : connctfy+0x39bc
    fffff880`0afda258 fffff800`63416d4d : 00000000`00001000 00000000`00000028 fffffa80`0bbcf010 ffffffff`ffffffff : 0xffff0000`0b9b9142
    fffff880`0afda260 00000000`00001000 : 00000000`00000028 fffffa80`0bbcf010 ffffffff`ffffffff fffffa80`0acab870 : 0xfffff800`63416d4d
    fffff880`0afda268 00000000`00000028 : fffffa80`0bbcf010 ffffffff`ffffffff fffffa80`0acab870 fffff880`0afda748 : 0x1000
    fffff880`0afda270 fffffa80`0bbcf010 : ffffffff`ffffffff fffffa80`0acab870 fffff880`0afda748 00000000`40010008 : 0x28
    fffff880`0afda278 ffffffff`ffffffff : fffffa80`0acab870 fffff880`0afda748 00000000`40010008 fffff880`04c3e32d : 0xfffffa80`0bbcf010
    fffff880`0afda280 fffffa80`0acab870 : fffff880`0afda748 00000000`40010008 fffff880`04c3e32d fffff880`01663110 : 0xffffffff`ffffffff
    fffff880`0afda288 fffff880`0afda748 : 00000000`40010008 fffff880`04c3e32d fffff880`01663110 00000000`00000000 : 0xfffffa80`0acab870
    fffff880`0afda290 00000000`40010008 : fffff880`04c3e32d fffff880`01663110 00000000`00000000 fffffa80`092531a0 : 0xfffff880`0afda748
    fffff880`0afda298 fffff880`04c3e32d : fffff880`01663110 00000000`00000000 fffffa80`092531a0 fffffa80`09253f68 : 0x40010008
    fffff880`0afda2a0 fffff880`01663110 : 00000000`00000000 fffffa80`092531a0 fffffa80`09253f68 fffffa80`092531a0 : connctfy+0x232d
    fffff880`0afda2a8 00000000`00000000 : fffffa80`092531a0 fffffa80`09253f68 fffffa80`092531a0 fffff880`0168710c : ndis!NdisFRegisterFilterDriver+0xfc00
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    connctfy+39bc
    fffff880`04c3f9bc ??              ???
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  connctfy+39bc
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: connctfy
    
    IMAGE_NAME:  connctfy.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bfe3927
    
    FAILURE_BUCKET_ID:  X64_0xA_connctfy+39bc
    
    BUCKET_ID:  X64_0xA_connctfy+39bc
    
    Followup: MachineOwner
    ---------


    Awesome! Problem Solved...You Rock!!!
    Spot On!!
    Thank you very much!

    YBL
      My Computer


  4. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #4

    Glad I could help :)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 21:35.
Find Us