Bluescreening again!

Page 1 of 2 12 LastLast

  1. Posts : 14
    Windows 7
       #1

    Bluescreening again!


    Hi,

    You guys helped me out before and cured my bluescreens for about 3 months. But now there back with a vengeance.

    I honestly think it's down to hardware, as no .sys files are appearing. I dont get a error message, and my screen goes crazy whenever I get one.

    My laptop then doesn't POST, and the fan just spins..

    Thanks for help!

    Dan.
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Your crashes are hardware related and the dumps point to memory corruption.

    Error Code 8E, KERNEL_MODE_EXCEPTION_NOT_HANDLED_M - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint in startup without having a debugger attached, Hardware incompatibility, Faulty system service, 3rd party remote control, Memory

    Error code 24, NTFS_FILE_SYSTEM - Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure

    Error code A, IRQL_NOT_LESS_OR_EQUAL - Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility


    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082610-22401-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x82a4c000 PsLoadedModuleList = 0x82b94810
    Debug session time: Thu Aug 26 15:17:45.914 2010 (GMT-4)
    System Uptime: 0 days 0:27:43.740
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 82a8f44a, b40e3cc0, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!KiFastCallEntry+12a )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82a8f44a, The address that the exception occurred at
    Arg3: b40e3cc0, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!KiFastCallEntry+12a
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1
    
    TRAP_FRAME:  b40e3cc0 -- (.trap 0xffffffffb40e3cc0)
    ErrCode = 00000000
    eax=00000000 ebx=82c7d48f ecx=82c7d59b edx=746c6644 esi=097efa24 edi=00000d28
    eip=82a8f44a esp=b40e3d34 ebp=00000001 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!KiFastCallEntry+0x12a:
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1       ss:0010:0000006d=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  msnmsgr.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 00000000 to 82a8f44a
    
    STACK_TEXT:  
    00000001 00000000 00000000 00000000 00000000 nt!KiFastCallEntry+0x12a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiFastCallEntry+12a
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiFastCallEntry+12a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    FAILURE_BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a
    
    BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start    end        module name
    8afad000 8aff5000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    920cc000 920dc000   AcpiVpc  AcpiVpc.sys  Tue Jan 12 17:18:24 2010 (4B4CF530)
    9083a000 90894000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    921a2000 921b4000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8b1a8000 8b1b1000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    9214a000 92183000   amfj1r3f amfj1r3f.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
    9210a000 92137000   Apfiltr  Apfiltr.sys  Fri Mar 14 08:23:10 2008 (47DA6E2E)
    9b119000 9b122000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
    8b164000 8b16d000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8b16d000 8b190000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    990b0000 990fd000   ATMFD    ATMFD.DLL    Wed May 26 23:49:36 2010 (4BFDEBD0)
    92090000 920cc000   b57nd60x b57nd60x.sys Sun Apr 26 07:15:34 2009 (49F44256)
    8aded000 8adf8000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    91e1f000 92086000   bcmwl6   bcmwl6.sys   Tue Jul 07 20:44:47 2009 (4A53EBFF)
    9038a000 90391000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    909ce000 909dc000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    8acb5000 8acbd000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    9991c000 99935000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    99090000 990ae000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
    90307000 90326000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    9127c000 912f4000   CHDRT32  CHDRT32.sys  Mon Jun 15 13:46:19 2009 (4A3688EB)
    8acff000 8adaa000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    8b592000 8b5b7000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    8acbd000 8acff000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    920dc000 920df700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    90349000 90383000   cmdguard cmdguard.sys Fri Jun 04 05:53:51 2010 (4C08CD2F)
    8b5c2000 8b5cc000   cmdhlp   cmdhlp.sys   Tue Jun 01 13:38:58 2010 (4C0545B2)
    8b387000 8b3e4000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8ade5000 8aded000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    92195000 921a2000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    91379000 91386000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    909b6000 909ce000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    909aa000 909b6000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8b600000 8b611000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    91323000 9133c000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    91386000 91397000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    90217000 902f1000   dump_iaStor dump_iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
    91397000 913a1000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    91c5b000 91d12000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    91d12000 91d4b000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8b1e5000 8b1f6000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8b1b1000 8b1e5000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8b3f2000 8b3fb000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8b560000 8b592000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    8b75d000 8b78e000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    92144000 92149280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
    8b7ef000 8b7ef680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
    82a15000 82a4c000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    999d8000 999e2000   hcmon    hcmon.sys    Fri May 21 01:53:58 2010 (4BF61FF6)
    91db0000 91dcf000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    99897000 9991c000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8b7e7000 8b7ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    920e0000 920f8000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    8b08a000 8b164000   iaStor   iaStor.sys   Thu Jun 04 21:42:33 2009 (4A287809)
    91634000 91c5b000   igdkmd32 igdkmd32.sys Fri Nov 06 17:53:52 2009 (4AF4A900)
    9090f000 90924000   inspect  inspect.sys  Tue Jun 01 13:38:29 2010 (4C054595)
    92183000 92195000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    920f8000 92105000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80bc7000 80bcf000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    90800000 90834000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8b374000 8b387000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8b50e000 8b533000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    91200000 91210000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    913ac000 913c7000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    8ac2c000 8aca4000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    913a1000 913ac000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    92137000 92144000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8b074000 8b08a000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    90326000 90349000   MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
    9b3b5000 9b3bde00   MpNWMon  MpNWMon.sys  Sat Mar 20 00:03:24 2010 (4BA4490C)
    99935000 99947000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    99947000 9996a000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    9996a000 999a5000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    999a5000 999c0000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    8b190000 8b19a000   msahci   msahci.sys   Mon Jul 13 19:45:50 2009 (4A5BC72E)
    903e3000 903ee000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8aff5000 8affd000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8b349000 8b374000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    909a0000 909aa000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8b7d7000 8b7e7000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8b419000 8b4d0000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    921cc000 921d7000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    99874000 99884000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    921d7000 921f9000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    9126b000 9127c000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    90924000 90932000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    90894000 908c6000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    8b4d0000 8b50e000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    903ee000 903fc000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    90996000 909a0000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82a4c000 82e5c000   nt       ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF)
    8b21a000 8b349000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    90383000 9038a000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    9982e000 99874000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    908d6000 908f5000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    8add4000 8ade5000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    8adaa000 8add4000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8b19a000 8b1a8000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    91600000 9160b900   pcouffin pcouffin.sys Tue Dec 05 09:39:53 2006 (457584B9)
    8b3e4000 8b3f2000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9b2dd000 9b374000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    912f4000 91323000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    8aca4000 8acb5000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8b1f6000 8b1ff200   PxHelp20 PxHelp20.sys Wed Mar 12 21:57:44 2008 (47D88A18)
    921b4000 921cc000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    91e00000 91e18000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    91dcf000 91de6000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    91de6000 91dfd000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    90955000 90996000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    903cb000 903d3000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    903d3000 903db000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    903db000 903e3000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8b533000 8b560000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    99884000 99897000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    8af87000 8afad000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
    9b374000 9b37e000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8b7d5000 8b7d6480   speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
    8b7cd000 8b7d5000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    8ae8b000 8af7e000   sptd     sptd.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
    9b05e000 9b0af000   srv      srv.sys      Tue Dec 08 03:05:37 2009 (4B1E08D1)
    9b00f000 9b05e000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
    9b37e000 9b39f000   srvnet   srvnet.sys   Tue Dec 08 03:05:06 2009 (4B1E08B2)
    91e18000 91e19380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8b614000 8b75d000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
    9b39f000 9b3ac000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8b5b7000 8b5c2000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    90200000 90217000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    90945000 90955000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    99060000 99069000   TSDDD    TSDDD.dll    unavailable (00000000)
    909dc000 909fd000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    9160c000 9161a000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    9133c000 91353000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    91353000 91354700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    91da1000 91db0000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    91227000 9126b000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    91d56000 91da1000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    91d4b000 91d56000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    91355000 91378b00   usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
    8ae00000 8ae0b000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    90906000 9090f000   vfilter  vfilter.sys  Wed Nov 18 19:06:18 2009 (4B048BFA)
    90391000 9039d000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    9039d000 903be000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    999e2000 999f1a00   vmci     vmci.sys     Fri May 21 01:21:04 2010 (4BF61840)
    92105000 92109600   VMkbd    VMkbd.sys    Fri May 21 02:43:42 2010 (4BF62B9E)
    913ef000 913f1f00   VMNET    VMNET.SYS    Mon Aug 10 08:03:57 2009 (4A800CAD)
    913e1000 913ef000   vmnetbridge vmnetbridge.sys Mon Aug 10 08:05:29 2009 (4A800D09)
    9b3ac000 9b3b0c80   vmnetuserif vmnetuserif.sys Fri May 21 02:07:27 2010 (4BF6231F)
    9b20e000 9b2dce00   vmx86    vmx86.sys    Fri May 21 03:30:41 2010 (4BF636A1)
    8ac00000 8ac10000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8b029000 8b074000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8b78e000 8b7cd000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    9b3b1000 9b3b4d80   vstor2_ws60 vstor2-ws60.sys Tue Apr 27 19:16:24 2010 (4BD77048)
    92086000 92090000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    908f5000 90906000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    90932000 90945000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    903be000 903cb000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8ae0c000 8ae7d000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8ae7d000 8ae8b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    908cf000 908d6000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    98e00000 9904a000   win32k   win32k.sys   Sat May 01 10:49:02 2010 (4BDC3F5E)
    8af7e000 8af87000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    908c6000 908cf000   ws2ifsl  ws2ifsl.sys  Mon Jul 13 19:55:01 2009 (4A5BC955)
    913c7000 913e1000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    9b0af000 9b119000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    999c0000 999d8000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b7f0000 8b7fd000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9021c000 902f6000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    902f6000 90307000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082510-20982-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0x82c39000 PsLoadedModuleList = 0x82d81810
    Debug session time: Wed Aug 25 17:18:11.128 2010 (GMT-4)
    System Uptime: 0 days 0:01:25.954
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ....
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 24, {1904fb, 9a47322c, 9a472e10, 4566744e}
    
    Unable to load image \SystemRoot\System32\DRIVERS\cmdguard.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for cmdguard.sys
    *** ERROR: Module load completed but symbols could not be loaded for cmdguard.sys
    Probably caused by : Ntfs.sys ( Ntfs!ExAllocateFromNPagedLookasideList+27 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 001904fb
    Arg2: 9a47322c
    Arg3: 9a472e10
    Arg4: 4566744e
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  9a47322c -- (.exr 0xffffffff9a47322c)
    ExceptionAddress: 4566744e
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000008
       Parameter[1]: 4566744e
    Attempt to execute non-executable address 4566744e
    
    CONTEXT:  9a472e10 -- (.cxr 0xffffffff9a472e10)
    eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=8b449d00 edi=00000001
    eip=4566744e esp=9a4732f4 ebp=9a473308 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    4566744e ??              ???
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000008
    
    EXCEPTION_PARAMETER2:  4566744e
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82da1718
    Unable to read MiSystemVaType memory at 82d81160
     4566744e 
    
    FOLLOWUP_IP: 
    Ntfs!ExAllocateFromNPagedLookasideList+27
    8b417920 5e              pop     esi
    
    FAULTING_IP: 
    +5cfd952f01fcdcf0
    4566744e ??              ???
    
    FAILED_INSTRUCTION_ADDRESS: 
    +5cfd952f01fcdcf0
    4566744e ??              ???
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from 8b417920 to 4566744e
    
    STACK_TEXT:  
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    9a4732f0 8b417920 00000011 000000b8 0000001a 0x4566744e
    9a473308 8b4b0d49 8b449d00 1103bed1 983ee7d0 Ntfs!ExAllocateFromNPagedLookasideList+0x27
    9a473418 8b497327 87db57e8 9a3ab3c0 983ee7d0 Ntfs!NtfsRestartIndexEnumeration+0x47
    9a473624 8b4b5783 87db57e8 883d5588 86d870d8 Ntfs!NtfsQueryDirectory+0x6d0
    9a473658 8b4b54fa 87db57e8 9a3ab3c0 1103bc09 Ntfs!NtfsCommonDirectoryControl+0x21d
    9a4736c0 82c754bc 86d87020 883d5588 883d5588 Ntfs!NtfsFsdDirectoryControl+0xf7
    9a4736d8 8b3a120c 00000000 8725be40 00000000 nt!IofCallDriver+0x63
    9a4736fc 8b3a20bf 9a47371c 86d847e0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    9a473734 8b3b7085 87d3da50 00000000 9a4737a8 fltmgr!FltPerformSynchronousIo+0xb9
    9a473744 9022da5a 87d3da50 8725be40 9aab3c00 fltmgr!FltQueryDirectoryFile+0x9d
    9a4737a8 8b3baa8c 87d3da50 8849cb68 80001250 luafv!LuafvNormalizeNameComponentEx+0xa8
    9a4737d8 8b3baeb6 883b9108 00000000 883b9108 fltmgr!FltpCallNormalizeNameComponentHandler+0x4e
    9a473804 8b3bbdf4 013b9108 881e1868 883b9108 fltmgr!FltpExpandShortNames+0x138
    9a473820 8b3bc505 883b0000 881e1868 883b283c fltmgr!FltpGetNormalizedFileNameWorker+0xae
    9a473838 8b3b9765 883b9108 881e1868 883b9108 fltmgr!FltpGetNormalizedFileName+0x19
    9a473850 8b3a3773 883b9108 00000000 883b9108 fltmgr!FltpCreateFileNameInformation+0x81
    9a473870 8b3a38c7 86d86e98 00000000 00000000 fltmgr!HandleStreamListNotSupported+0x125
    9a4738a0 8b3a3fa3 c00000bb 87d35bb8 88403008 fltmgr!FltpGetFileNameInformation+0xc7
    9a4738c8 9034dd25 001e1870 00000101 9a473924 fltmgr!FltGetFileNameInformation+0x12b
    9a47391c 9033966e 881e1870 9a47394c 9a473998 cmdguard+0x1dd25
    9a47392c 8b39daeb 881e1870 9a47394c 9a473978 cmdguard+0x966e
    9a473998 8b3a09f0 9a4739dc 883d3c38 00000000 fltmgr!FltpPerformPreCallbacks+0x34d
    9a4739b0 8b3b41fe 9a4739dc 8b3b7f3c 00000000 fltmgr!FltpPassThroughInternal+0x40
    9a4739c4 8b3b48b7 9a4739dc 883d3c38 8849cb68 fltmgr!FltpCreateInternal+0x24
    9a473a08 82c754bc 86d847e0 86d86ae0 8849cbc4 fltmgr!FltpCreate+0x2c9
    9a473a20 82e796ad be028b8b 9a473bc8 00000000 nt!IofCallDriver+0x63
    9a473af8 82e5a26b 86d36bb0 8559d298 880f3d20 nt!IopParseDevice+0xed7
    9a473b74 82e802d9 00000000 9a473bc8 00000040 nt!ObpLookupObjectName+0x4fa
    9a473bd0 82e7862b 01eeeb8c 8559d298 9a470001 nt!ObOpenObjectByName+0x165
    9a473c4c 82e83f42 01eeebe8 80100080 01eeeb8c nt!IopCreateFile+0x673
    9a473c98 9033d2e6 01eeebe8 80100080 01eeeb8c nt!NtCreateFile+0x34
    9a473d00 82c7c44a 01eeebe8 80100080 01eeeb8c cmdguard+0xd2e6
    9a473d00 777864f4 01eeebe8 80100080 01eeeb8c nt!KiFastCallEntry+0x12a
    01eeebf0 00000000 00000000 00000000 00000000 0x777864f4
    
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  Ntfs!ExAllocateFromNPagedLookasideList+27
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff9a472e10 ; kb
    
    FAILURE_BUCKET_ID:  0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27
    
    BUCKET_ID:  0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\071810-19110-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x82a15000 PsLoadedModuleList = 0x82b5d810
    Debug session time: Sun Jul 18 11:51:08.454 2010 (GMT-4)
    System Uptime: 0 days 2:39:50.280
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {905fc0f, 2, 0, 82b07b40}
    
    Probably caused by : ntkrpamp.exe ( nt!PpmPerfRecordUtility+af )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0905fc0f, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82b07b40, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82b7d718
    Unable to read MiSystemVaType memory at 82b5d160
     0905fc0f 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!PpmPerfRecordUtility+af
    82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  82b3ba14 -- (.trap 0xffffffff82b3ba14)
    ErrCode = 00000000
    eax=0000c679 ebx=00000000 ecx=0905fbf3 edx=00000004 esi=82b3ed20 edi=00000000
    eip=82b07b40 esp=82b3ba88 ebp=82b3bad0 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!PpmPerfRecordUtility+0xaf:
    82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch] ds:0023:0905fc0f=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82b07b40 to 82a5b82b
    
    STACK_TEXT:  
    82b3ba14 82b07b40 badb0d00 00000004 fffffffe nt!KiTrap0E+0x2cf
    82b3bad0 82b070b7 82b3bba0 00000000 82b48280 nt!PpmPerfRecordUtility+0xaf
    82b3bb10 82b06f6d 82b06f02 00000000 00000000 nt!PpmCheckRecordAllUtility+0xd2
    82b3bb14 82b06f02 00000000 00000000 00000000 nt!PpmCheckRun+0x5a
    82b3bb38 82a7f04d 82b4cc58 00000000 09ab8dd9 nt!PpmCheckStart+0x4d
    82b3bb7c 82a7eff1 82b3ed20 82b3bca8 00000001 nt!KiProcessTimerDpcTable+0x50
    82b3bc68 82a7eeae 82b3ed20 82b3bca8 00000000 nt!KiProcessExpiredTimerList+0x101
    82b3bcdc 82a7d20e 00096165 8549d5c0 82b48280 nt!KiTimerExpiration+0x25c
    82b3bd20 82a7d038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
    82b3bd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!PpmPerfRecordUtility+af
    82b07b40 8b511c          mov     edx,dword ptr [ecx+1Ch]
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!PpmPerfRecordUtility+af
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    FAILURE_BUCKET_ID:  0xA_nt!PpmPerfRecordUtility+af
    
    BUCKET_ID:  0xA_nt!PpmPerfRecordUtility+af
    
    Followup: MachineOwner
    ---------
    Please run Memtest 86 to test your RAM.

    RAM - Test with Memtest86+

    Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads

    While you are troubleshooting, I recommend that you uninstall Comodo using the Comodo uninstall tool. Turn Windows Firewall on. You can reinstall Comodo once you have your system running smoothly and try it.

    What antivirus are you using?

    I also find some old drivers. Out of date drivers can and do corrupt memory and causes crashes. Up dtate these driver or uninstall the obsolete software. The drivers in red font are way obsolete.
    Apfiltr.sys Fri Mar 14 08:23:10 2008
    b57nd60x.sys Sun Apr 26 07:15:34 2009
    bcmwl6.sys Tue Jul 07 20:44:47 2009
    CHDRT32.sys Mon Jun 15 13:46:19 2009
    giveio.sys Wed Apr 03 22:33:25 1996
    iaStor.sys Thu Jun 04 21:42:33 2009
    pcouffin.sys Tue Dec 05 09:39:53 2006
    PxHelp20.sys Wed Mar 12 21:57:44 2008
    If you need help updating your drivers, please post back.

      My Computer


  3. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #3

    Hello and Welcome !

    Seems like lot of old drivers are causing the problem. First thing is removing Duplex driver i.e. sptd.sys check this article DuplexSecure - FAQ

    Go to C:\Windows\System32\Drivers and rename giveio.sys to giveio.old and reboot the System because it's dated 1996 which is very dangerous.

    Update the Drivers

    Code:
    pcouffin.sys Tue Dec 05 20:09:53 2006
    PxHelp20.sys Thu Mar 13 07:27:44 2008
    Apfiltr.sys  Fri Mar 14 17:53:10 2008
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82a8f44a, The address that the exception occurred at
    Arg3: b40e3cc0, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    nt!KiFastCallEntry+12a
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1
    
    TRAP_FRAME:  b40e3cc0 -- (.trap 0xffffffffb40e3cc0)
    ErrCode = 00000000
    eax=00000000 ebx=82c7d48f ecx=82c7d59b edx=746c6644 esi=097efa24 edi=00000d28
    eip=82a8f44a esp=b40e3d34 ebp=00000001 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!KiFastCallEntry+0x12a:
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1       ss:0010:0000006d=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  msnmsgr.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 00000000 to 82a8f44a
    
    STACK_TEXT:  
    00000001 00000000 00000000 00000000 00000000 nt!KiFastCallEntry+0x12a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiFastCallEntry+12a
    82a8f44a f6456c01        test    byte ptr [ebp+6Ch],1
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiFastCallEntry+12a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    FAILURE_BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a
    
    BUCKET_ID:  0x8E_nt!KiFastCallEntry+12a
    Hope this helps,
    Captain
      My Computer


  4. Posts : 14
    Windows 7
    Thread Starter
       #4

    giveio.old - Isn't it used by SpeedFan?
      My Computer


  5. Posts : 2,528
    Windows 10 Pro x64
       #5

    Actually, I think it's less sinister than that, although probably no less frustrating:
    Code:
    0: kd> k
    ChildEBP RetAddr  
    9a472cb4 8b41e221 nt!KeBugCheckEx+0x1e
    9a472cdc 8b4b551b Ntfs!NtfsExceptionFilter+0xad
    9a472ce8 8b416b88 Ntfs!NtfsFsdDirectoryControl+0x118
    9a472cfc 8b4204c3 Ntfs!_EH4_CallFilterFunc+0x12
    9a472d24 82ca1822 Ntfs!_except_handler4+0x8e
    9a472d48 82ca17f4 nt!ExecuteHandler2+0x26
    9a472e00 82cf6352 nt!ExecuteHandler+0x24
    9a473210 82c7d036 nt!KiDispatchException+0x17c
    9a473278 82c7cfea nt!CommonDispatchException+0x4a
    9a4732f0 8b417920 nt!Kei386EoiHelper+0x192
    9a473308 8b4b0d49 Ntfs!ExAllocateFromNPagedLookasideList+0x27
    9a473418 8b497327 Ntfs!NtfsRestartIndexEnumeration+0x47
    9a473624 8b4b5783 Ntfs!NtfsQueryDirectory+0x6d0
    9a473658 8b4b54fa Ntfs!NtfsCommonDirectoryControl+0x21d
    9a4736c0 82c754bc Ntfs!NtfsFsdDirectoryControl+0xf7
    9a4736d8 8b3a120c nt!IofCallDriver+0x63
    9a4736fc 8b3a20bf fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    9a473734 8b3b7085 fltmgr!FltPerformSynchronousIo+0xb9
    9a473744 9022da5a fltmgr!FltQueryDirectoryFile+0x9d
    9a4737a8 8b3baa8c luafv!LuafvNormalizeNameComponentEx+0xa8
    9a4737d8 8b3baeb6 fltmgr!FltpCallNormalizeNameComponentHandler+0x4e
    9a473804 8b3bbdf4 fltmgr!FltpExpandShortNames+0x138
    9a473820 8b3bc505 fltmgr!FltpGetNormalizedFileNameWorker+0xae
    9a473838 8b3b9765 fltmgr!FltpGetNormalizedFileName+0x19
    9a473850 8b3a3773 fltmgr!FltpCreateFileNameInformation+0x81
    9a473870 8b3a38c7 fltmgr!HandleStreamListNotSupported+0x125
    9a4738a0 8b3a3fa3 fltmgr!FltpGetFileNameInformation+0xc7
    *** WARNING: Unable to verify timestamp for cmdguard.sys
    *** ERROR: Module load completed but symbols could not be loaded for cmdguard.sys
    9a4738c8 9034dd25 fltmgr!FltGetFileNameInformation+0x12b
    WARNING: Stack unwind information not available. Following frames may be wrong.
    9a47391c 9033966e cmdguard+0x1dd25
    9a47392c 8b39daeb cmdguard+0x966e
    9a473998 8b3a09f0 fltmgr!FltpPerformPreCallbacks+0x34d
    9a4739b0 8b3b41fe fltmgr!FltpPassThroughInternal+0x40
    9a4739c4 8b3b48b7 fltmgr!FltpCreateInternal+0x24
    9a473a08 82c754bc fltmgr!FltpCreate+0x2c9
    9a473a20 82e796ad nt!IofCallDriver+0x63
    9a473af8 82e5a26b nt!IopParseDevice+0xed7
    9a473b74 82e802d9 nt!ObpLookupObjectName+0x4fa
    9a473bd0 82e7862b nt!ObOpenObjectByName+0x165
    9a473c4c 82e83f42 nt!IopCreateFile+0x673
    9a473c98 9033d2e6 nt!NtCreateFile+0x34
    9a473d00 82c7c44a cmdguard+0xd2e6
    9a473d00 777864f4 nt!KiFastCallEntry+0x12a
    01eeebf0 00000000 0x777864f4
    The Comodo driver predates Win7 - are we sure this version is Windows 7 compatible (and not just Vista compatible)? Also, this stack is passing through LUA file virtualization, so driver verifier if this is the latest version is probably your next step.
      My Computer


  6. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #6

    Here is some driver help.

    Apfiltr.sys - Alps Pointing-device Driver or Alps Touch Pad Driver belongs to the software Alps Pointing-device Driver for Windows 2000/XP or Alps Touch Pad Filter Driver for Windows 2000/XP or Alps Touch Pad Driver for Windows 2000/XP or Alps Pointing-device Filter Driver by Alps Electric Co., Ltd (www.alps.com).

    b57nd60x.sys - Broadcom NetXtreme Gigabit Ethernet NDIS6.0 DriverBroadcom.com - Downloads & Support

    bcmwl6.sys - Broadcom 802.11g Network Adapter driver Broadcom.com - Downloads & Support

    CHDRT32.sys - Conexant High Definition SmartAudioConexant: Support

    giveio.sys - ADC Analyzer/SwiftForth/Disspy - ?SpeedFan? I/O Port Programming with Delphi and NT. This software is obsolete. Uninstall it and make sure this driver is gone.

    iaStor.sys - Intel Storage drivers http://downloadcenter.intel.com/Default.aspx

    pcouffin.sys - Patin-Couffin low level access layer for CD devices or low level access layer for CD/DVD/BD devices or VSO Software pcouffin belongs to the software Low level access layer for CD devices or Patin couffin engine or VSO Software pcouffin by VSO Software (www.vso-software.fr). Uninstall this software. It is obsolete.

    PxHelp20.sys -A part of:
    RecordNow!
    ESSSONIC
    Sonic RecordNow!/Sonic_PrimoSDK
    Dell Media Experience
    Pioneer RecordNow DX
    Sonic MyDVD/RecordNow!/RecordNow DX/MyDVD Plus/PrimoSDK
    Microsoft Plus! Digital Media/Digital Image Suite
    Corel Photo Album
    HP RecordNow/DigitalMedia Archive
    IBM RecordNow!
    Roxio Easy Media Creator/RecordNow Copy/Drag-to-Disc/Creator Basic v/Media Manager/CinePlayer
    Adobe Photoshop Lightroom
    Yahoo! Music Jukebox or Roxio
    Napster Burn Engine
    1CLICK DivxToDVD
    OLYMPUS muvee theaterPack
    by Sonic Solutions (www.sonic.com) or VERITAS Software, Inc (www.veritas.com).
    Unistall the software related to this driver or disable the driver, which will break the program. Navigate to C:\Windows\System32\Drivers. Findpcouffin.sys in the Driver folder and rename it to pcouffin.bak. Reboot. You can always rename it back to .sys later.

    I hope this assists you with your drivers.
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    Povall54 said:
    giveio.old - Isn't it used by SpeedFan?
    It may be. If so, it is an old version of Speedfan. Uninstall the old version of Speedfan , download and install an updated version. I think the newest version of Speed fan has a 2006 driver. Though old, the 2006 driver works well with Win 7. A 1996 driver is an XP driver.

    What antivirus are you using?
      My Computer


  8. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #8

    As cluberti and one of our finest BSOD Analyst zigzag3143 mentioned uninstall Comodo Internet security and run the Comodo uninstaller check these articles How to uninstall Comodo Firewall? and Uinstall Comodo Internet Security —How To Easily Uninstall Comodo Internet Security From Your Computer? | Computer Security Articles

    Hope this helps,
    Captain
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    That makes three of us recommending that you uninstall Comodo. I mentioned it my first post. One of the dumps indicated a Comodo driver.
      My Computer


  10. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #10

    CarlTR6 said:
    That makes three of us recommending that you uninstall Comodo. I mentioned it my first post. One of the dumps indicated a Comodo driver.
    Sorry Carl i didn't see that one your post.
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 15:03.
Find Us