Do a System Restore and remove that TunUP Utilities since it could have messed up your system
Windows 7 does not need any 'TuneUp' software or whatsoever related utilities
Run SFC /SCANNOW Command - System File Checker
Code:
TuneUpUtilitiesDriver64.sys fffff880`03b92000 fffff880`03b9a000 0x00008000 0x4ab2238c 17/09/2009 15:54:52
ASACPI.sys the 2005 version is a huge cause of BSODs
Information
T
he 2005 version of this driver is a known BSOD cause.
Please visit this link: ASUSTeK Computer Inc. -Support- Drivers and Download P7P55D LE
Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit" (it's about the 12th item down).
Download and install it.
Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005)
Code:
ASACPI.sys fffff880`05abd000 fffff880`05ac5000 0x00008000 0x42476c4c 28/03/2005 06:30:36
Update your Nvidia driver NVIDIA DRIVERS 270.61 WHQL
Code:
nvlddmkm.sys fffff880`04a12000 fffff880`055f6c80 0x00be4c80 0x4c6d3530 19/08/2010 17:44:16
Information
Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp,
sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done:
DuplexSecure - Downloads
You can use MagicDisc as an alternative.
Code:
sptd.sys fffff880`010ad000 fffff880`011d3000 0x00126000 0x4ad24632 12/10/2009 00:55:14
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffac8901ba6d80, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ceee7b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f180e8
ffffac8901ba6d80
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSearchForNewThread+26b
fffff800`02ceee7b 66453b9080010000 cmp r10w,word ptr [r8+180h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: DragonAge2.exe
TRAP_FRAME: fffff880088ac880 -- (.trap 0xfffff880088ac880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001000 rbx=0000000000000000 rcx=fffff880031d7740
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ceee7b rsp=fffff880088aca10 rbp=0000000000000001
r8=ffffac8901ba6c00 r9=000000000000000c r10=0000000000000000
r11=fffff80002e59e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSearchForNewThread+0x26b:
fffff800`02ceee7b 66453b9080010000 cmp r10w,word ptr [r8+180h] ds:ffffac89`01ba6d80=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ce6be9 to fffff80002ce7640
STACK_TEXT:
fffff880`088ac738 fffff800`02ce6be9 : 00000000`0000000a ffffac89`01ba6d80 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`088ac740 fffff800`02ce5860 : 00000000`00000000 fffffa80`00680727 fffff880`088ac7e0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`088ac880 fffff800`02ceee7b : fffffa80`02f2e5e0 00000000`00000000 fffffa80`01baa320 fffff800`02feefbd : nt!KiPageFault+0x260
fffff880`088aca10 fffff800`02cec93c : fffff880`088aca80 fffffa80`01b0c4e0 fffffa80`00000000 00000000`00000001 : nt!KiSearchForNewThread+0x26b
fffff880`088aca80 fffff800`02cef1af : 00000000`00000130 fffffa80`01e83b30 fffffa80`00000000 fffff8a0`07b5a820 : nt!KiCommitThreadWait+0x17c
fffff880`088acb10 fffff800`02fdd99e : fffff880`088acc00 fffffa80`00000006 00000000`00000001 fffff800`02fdea00 : nt!KeWaitForSingleObject+0x19f
fffff880`088acbb0 fffff800`02ce68d3 : fffffa80`01b0c4e0 00000000`00000130 00000000`00000000 fffffa80`01e81460 : nt!NtWaitForSingleObject+0xde
fffff880`088acc20 00000000`739a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0291f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739a2e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSearchForNewThread+26b
fffff800`02ceee7b 66453b9080010000 cmp r10w,word ptr [r8+180h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSearchForNewThread+26b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xA_nt!KiSearchForNewThread+26b
BUCKET_ID: X64_0xA_nt!KiSearchForNewThread+26b
Followup: MachineOwner
---------