Your crashes are hardware related and the dumps point to memory corruption.
Error Code 8E, KERNEL_MODE_EXCEPTION_NOT_HANDLED_M - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint in startup without having a debugger attached, Hardware incompatibility, Faulty system service, 3rd party remote control, Memory
Error code 24, NTFS_FILE_SYSTEM - Disk corruption, insufficient physical memory, Device driver, Indexing, Resident antivirus, backup, defrag programs, Disk/Drive failing/failure
Error code A, IRQL_NOT_LESS_OR_EQUAL - Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082610-22401-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a4c000 PsLoadedModuleList = 0x82b94810
Debug session time: Thu Aug 26 15:17:45.914 2010 (GMT-4)
System Uptime: 0 days 0:27:43.740
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 82a8f44a, b40e3cc0, 0}
Probably caused by : ntkrpamp.exe ( nt!KiFastCallEntry+12a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a8f44a, The address that the exception occurred at
Arg3: b40e3cc0, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiFastCallEntry+12a
82a8f44a f6456c01 test byte ptr [ebp+6Ch],1
TRAP_FRAME: b40e3cc0 -- (.trap 0xffffffffb40e3cc0)
ErrCode = 00000000
eax=00000000 ebx=82c7d48f ecx=82c7d59b edx=746c6644 esi=097efa24 edi=00000d28
eip=82a8f44a esp=b40e3d34 ebp=00000001 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!KiFastCallEntry+0x12a:
82a8f44a f6456c01 test byte ptr [ebp+6Ch],1 ss:0010:0000006d=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: msnmsgr.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 00000000 to 82a8f44a
STACK_TEXT:
00000001 00000000 00000000 00000000 00000000 nt!KiFastCallEntry+0x12a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiFastCallEntry+12a
82a8f44a f6456c01 test byte ptr [ebp+6Ch],1
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiFastCallEntry+12a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cacf
FAILURE_BUCKET_ID: 0x8E_nt!KiFastCallEntry+12a
BUCKET_ID: 0x8E_nt!KiFastCallEntry+12a
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
8afad000 8aff5000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
920cc000 920dc000 AcpiVpc AcpiVpc.sys Tue Jan 12 17:18:24 2010 (4B4CF530)
9083a000 90894000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
921a2000 921b4000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b1a8000 8b1b1000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
9214a000 92183000 amfj1r3f amfj1r3f.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
9210a000 92137000 Apfiltr Apfiltr.sys Fri Mar 14 08:23:10 2008 (47DA6E2E)
9b119000 9b122000 asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
8b164000 8b16d000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b16d000 8b190000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
990b0000 990fd000 ATMFD ATMFD.DLL Wed May 26 23:49:36 2010 (4BFDEBD0)
92090000 920cc000 b57nd60x b57nd60x.sys Sun Apr 26 07:15:34 2009 (49F44256)
8aded000 8adf8000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3)
91e1f000 92086000 bcmwl6 bcmwl6.sys Tue Jul 07 20:44:47 2009 (4A53EBFF)
9038a000 90391000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
909ce000 909dc000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8acb5000 8acbd000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9991c000 99935000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
99090000 990ae000 cdd cdd.dll Mon Jul 13 21:04:18 2009 (4A5BD992)
90307000 90326000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C)
9127c000 912f4000 CHDRT32 CHDRT32.sys Mon Jun 15 13:46:19 2009 (4A3688EB)
8acff000 8adaa000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b592000 8b5b7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8acbd000 8acff000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
920dc000 920df700 CmBatt CmBatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
90349000 90383000 cmdguard cmdguard.sys Fri Jun 04 05:53:51 2010 (4C08CD2F)
8b5c2000 8b5cc000 cmdhlp cmdhlp.sys Tue Jun 01 13:38:58 2010 (4C0545B2)
8b387000 8b3e4000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
8ade5000 8aded000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
92195000 921a2000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
91379000 91386000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
909b6000 909ce000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
909aa000 909b6000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b600000 8b611000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
91323000 9133c000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
91386000 91397000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
90217000 902f1000 dump_iaStor dump_iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
91397000 913a1000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
91c5b000 91d12000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1)
91d12000 91d4b000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8b1e5000 8b1f6000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b1b1000 8b1e5000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b3f2000 8b3fb000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12)
8b560000 8b592000 fvevol fvevol.sys Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b75d000 8b78e000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
92144000 92149280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
8b7ef000 8b7ef680 giveio giveio.sys Wed Apr 03 22:33:25 1996 (316334F5)
82a15000 82a4c000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
999d8000 999e2000 hcmon hcmon.sys Fri May 21 01:53:58 2010 (4BF61FF6)
91db0000 91dcf000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
99897000 9991c000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b7e7000 8b7ef000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
920e0000 920f8000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8b08a000 8b164000 iaStor iaStor.sys Thu Jun 04 21:42:33 2009 (4A287809)
91634000 91c5b000 igdkmd32 igdkmd32.sys Fri Nov 06 17:53:52 2009 (4AF4A900)
9090f000 90924000 inspect inspect.sys Tue Jun 01 13:38:29 2010 (4C054595)
92183000 92195000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
920f8000 92105000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bc7000 80bcf000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
90800000 90834000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
8b374000 8b387000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8b50e000 8b533000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6)
91200000 91210000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
913ac000 913c7000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
8ac2c000 8aca4000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
913a1000 913ac000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
92137000 92144000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
8b074000 8b08a000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
90326000 90349000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E)
9b3b5000 9b3bde00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C)
99935000 99947000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
99947000 9996a000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72)
9996a000 999a5000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
999a5000 999c0000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8b190000 8b19a000 msahci msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
903e3000 903ee000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8aff5000 8affd000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b349000 8b374000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F)
909a0000 909aa000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b7d7000 8b7e7000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b419000 8b4d0000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
921cc000 921d7000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
99874000 99884000 ndisuio ndisuio.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
921d7000 921f9000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
9126b000 9127c000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
90924000 90932000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
90894000 908c6000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
8b4d0000 8b50e000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
903ee000 903fc000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
90996000 909a0000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a4c000 82e5c000 nt ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF)
8b21a000 8b349000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
90383000 9038a000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10)
9982e000 99874000 nwifi nwifi.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
908d6000 908f5000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
8add4000 8ade5000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
8adaa000 8add4000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b19a000 8b1a8000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
91600000 9160b900 pcouffin pcouffin.sys Tue Dec 05 09:39:53 2006 (457584B9)
8b3e4000 8b3f2000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9b2dd000 9b374000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
912f4000 91323000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
8aca4000 8acb5000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8b1f6000 8b1ff200 PxHelp20 PxHelp20.sys Wed Mar 12 21:57:44 2008 (47D88A18)
921b4000 921cc000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
91e00000 91e18000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
91dcf000 91de6000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
91de6000 91dfd000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
90955000 90996000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
903cb000 903d3000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
903d3000 903db000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
903db000 903e3000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b533000 8b560000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
99884000 99897000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8af87000 8afad000 SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
9b374000 9b37e000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
8b7d5000 8b7d6480 speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
8b7cd000 8b7d5000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
8ae8b000 8af7e000 sptd sptd.sys Sun Oct 11 16:54:02 2009 (4AD245EA)
9b05e000 9b0af000 srv srv.sys Tue Dec 08 03:05:37 2009 (4B1E08D1)
9b00f000 9b05e000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC)
9b37e000 9b39f000 srvnet srvnet.sys Tue Dec 08 03:05:06 2009 (4B1E08B2)
91e18000 91e19380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8b614000 8b75d000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E)
9b39f000 9b3ac000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8b5b7000 8b5c2000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
90200000 90217000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
90945000 90955000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
99060000 99069000 TSDDD TSDDD.dll unavailable (00000000)
909dc000 909fd000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
9160c000 9161a000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
9133c000 91353000 usbccgp usbccgp.sys Mon Jul 13 19:51:31 2009 (4A5BC883)
91353000 91354700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
91da1000 91db0000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
91227000 9126b000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
91d56000 91da1000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
91d4b000 91d56000 usbuhci usbuhci.sys Mon Jul 13 19:51:10 2009 (4A5BC86E)
91355000 91378b00 usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
8ae00000 8ae0b000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
90906000 9090f000 vfilter vfilter.sys Wed Nov 18 19:06:18 2009 (4B048BFA)
90391000 9039d000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
9039d000 903be000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
999e2000 999f1a00 vmci vmci.sys Fri May 21 01:21:04 2010 (4BF61840)
92105000 92109600 VMkbd VMkbd.sys Fri May 21 02:43:42 2010 (4BF62B9E)
913ef000 913f1f00 VMNET VMNET.SYS Mon Aug 10 08:03:57 2009 (4A800CAD)
913e1000 913ef000 vmnetbridge vmnetbridge.sys Mon Aug 10 08:05:29 2009 (4A800D09)
9b3ac000 9b3b0c80 vmnetuserif vmnetuserif.sys Fri May 21 02:07:27 2010 (4BF6231F)
9b20e000 9b2dce00 vmx86 vmx86.sys Fri May 21 03:30:41 2010 (4BF636A1)
8ac00000 8ac10000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8b029000 8b074000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8b78e000 8b7cd000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
9b3b1000 9b3b4d80 vstor2_ws60 vstor2-ws60.sys Tue Apr 27 19:16:24 2010 (4BD77048)
92086000 92090000 vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
908f5000 90906000 vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
90932000 90945000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
903be000 903cb000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8ae0c000 8ae7d000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ae7d000 8ae8b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
908cf000 908d6000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
98e00000 9904a000 win32k win32k.sys Sat May 01 10:49:02 2010 (4BDC3F5E)
8af7e000 8af87000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
908c6000 908cf000 ws2ifsl ws2ifsl.sys Mon Jul 13 19:55:01 2009 (4A5BC955)
913c7000 913e1000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
Unloaded modules:
9b0af000 9b119000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
999c0000 999d8000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8b7f0000 8b7fd000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9021c000 902f6000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
902f6000 90307000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\082510-20982-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c39000 PsLoadedModuleList = 0x82d81810
Debug session time: Wed Aug 25 17:18:11.128 2010 (GMT-4)
System Uptime: 0 days 0:01:25.954
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
0: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, 9a47322c, 9a472e10, 4566744e}
Unable to load image \SystemRoot\System32\DRIVERS\cmdguard.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cmdguard.sys
*** ERROR: Module load completed but symbols could not be loaded for cmdguard.sys
Probably caused by : Ntfs.sys ( Ntfs!ExAllocateFromNPagedLookasideList+27 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 001904fb
Arg2: 9a47322c
Arg3: 9a472e10
Arg4: 4566744e
Debugging Details:
------------------
EXCEPTION_RECORD: 9a47322c -- (.exr 0xffffffff9a47322c)
ExceptionAddress: 4566744e
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 4566744e
Attempt to execute non-executable address 4566744e
CONTEXT: 9a472e10 -- (.cxr 0xffffffff9a472e10)
eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=8b449d00 edi=00000001
eip=4566744e esp=9a4732f4 ebp=9a473308 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
4566744e ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 4566744e
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82da1718
Unable to read MiSystemVaType memory at 82d81160
4566744e
FOLLOWUP_IP:
Ntfs!ExAllocateFromNPagedLookasideList+27
8b417920 5e pop esi
FAULTING_IP:
+5cfd952f01fcdcf0
4566744e ?? ???
FAILED_INSTRUCTION_ADDRESS:
+5cfd952f01fcdcf0
4566744e ?? ???
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from 8b417920 to 4566744e
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
9a4732f0 8b417920 00000011 000000b8 0000001a 0x4566744e
9a473308 8b4b0d49 8b449d00 1103bed1 983ee7d0 Ntfs!ExAllocateFromNPagedLookasideList+0x27
9a473418 8b497327 87db57e8 9a3ab3c0 983ee7d0 Ntfs!NtfsRestartIndexEnumeration+0x47
9a473624 8b4b5783 87db57e8 883d5588 86d870d8 Ntfs!NtfsQueryDirectory+0x6d0
9a473658 8b4b54fa 87db57e8 9a3ab3c0 1103bc09 Ntfs!NtfsCommonDirectoryControl+0x21d
9a4736c0 82c754bc 86d87020 883d5588 883d5588 Ntfs!NtfsFsdDirectoryControl+0xf7
9a4736d8 8b3a120c 00000000 8725be40 00000000 nt!IofCallDriver+0x63
9a4736fc 8b3a20bf 9a47371c 86d847e0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
9a473734 8b3b7085 87d3da50 00000000 9a4737a8 fltmgr!FltPerformSynchronousIo+0xb9
9a473744 9022da5a 87d3da50 8725be40 9aab3c00 fltmgr!FltQueryDirectoryFile+0x9d
9a4737a8 8b3baa8c 87d3da50 8849cb68 80001250 luafv!LuafvNormalizeNameComponentEx+0xa8
9a4737d8 8b3baeb6 883b9108 00000000 883b9108 fltmgr!FltpCallNormalizeNameComponentHandler+0x4e
9a473804 8b3bbdf4 013b9108 881e1868 883b9108 fltmgr!FltpExpandShortNames+0x138
9a473820 8b3bc505 883b0000 881e1868 883b283c fltmgr!FltpGetNormalizedFileNameWorker+0xae
9a473838 8b3b9765 883b9108 881e1868 883b9108 fltmgr!FltpGetNormalizedFileName+0x19
9a473850 8b3a3773 883b9108 00000000 883b9108 fltmgr!FltpCreateFileNameInformation+0x81
9a473870 8b3a38c7 86d86e98 00000000 00000000 fltmgr!HandleStreamListNotSupported+0x125
9a4738a0 8b3a3fa3 c00000bb 87d35bb8 88403008 fltmgr!FltpGetFileNameInformation+0xc7
9a4738c8 9034dd25 001e1870 00000101 9a473924 fltmgr!FltGetFileNameInformation+0x12b
9a47391c 9033966e 881e1870 9a47394c 9a473998 cmdguard+0x1dd25
9a47392c 8b39daeb 881e1870 9a47394c 9a473978 cmdguard+0x966e
9a473998 8b3a09f0 9a4739dc 883d3c38 00000000 fltmgr!FltpPerformPreCallbacks+0x34d
9a4739b0 8b3b41fe 9a4739dc 8b3b7f3c 00000000 fltmgr!FltpPassThroughInternal+0x40
9a4739c4 8b3b48b7 9a4739dc 883d3c38 8849cb68 fltmgr!FltpCreateInternal+0x24
9a473a08 82c754bc 86d847e0 86d86ae0 8849cbc4 fltmgr!FltpCreate+0x2c9
9a473a20 82e796ad be028b8b 9a473bc8 00000000 nt!IofCallDriver+0x63
9a473af8 82e5a26b 86d36bb0 8559d298 880f3d20 nt!IopParseDevice+0xed7
9a473b74 82e802d9 00000000 9a473bc8 00000040 nt!ObpLookupObjectName+0x4fa
9a473bd0 82e7862b 01eeeb8c 8559d298 9a470001 nt!ObOpenObjectByName+0x165
9a473c4c 82e83f42 01eeebe8 80100080 01eeeb8c nt!IopCreateFile+0x673
9a473c98 9033d2e6 01eeebe8 80100080 01eeeb8c nt!NtCreateFile+0x34
9a473d00 82c7c44a 01eeebe8 80100080 01eeeb8c cmdguard+0xd2e6
9a473d00 777864f4 01eeebe8 80100080 01eeeb8c nt!KiFastCallEntry+0x12a
01eeebf0 00000000 00000000 00000000 00000000 0x777864f4
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!ExAllocateFromNPagedLookasideList+27
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
STACK_COMMAND: .cxr 0xffffffff9a472e10 ; kb
FAILURE_BUCKET_ID: 0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27
BUCKET_ID: 0x24_BAD_IP_Ntfs!ExAllocateFromNPagedLookasideList+27
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\A-RAR2\071810-19110-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a15000 PsLoadedModuleList = 0x82b5d810
Debug session time: Sun Jul 18 11:51:08.454 2010 (GMT-4)
System Uptime: 0 days 2:39:50.280
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {905fc0f, 2, 0, 82b07b40}
Probably caused by : ntkrpamp.exe ( nt!PpmPerfRecordUtility+af )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0905fc0f, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82b07b40, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b7d718
Unable to read MiSystemVaType memory at 82b5d160
0905fc0f
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmPerfRecordUtility+af
82b07b40 8b511c mov edx,dword ptr [ecx+1Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: 82b3ba14 -- (.trap 0xffffffff82b3ba14)
ErrCode = 00000000
eax=0000c679 ebx=00000000 ecx=0905fbf3 edx=00000004 esi=82b3ed20 edi=00000000
eip=82b07b40 esp=82b3ba88 ebp=82b3bad0 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!PpmPerfRecordUtility+0xaf:
82b07b40 8b511c mov edx,dword ptr [ecx+1Ch] ds:0023:0905fc0f=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82b07b40 to 82a5b82b
STACK_TEXT:
82b3ba14 82b07b40 badb0d00 00000004 fffffffe nt!KiTrap0E+0x2cf
82b3bad0 82b070b7 82b3bba0 00000000 82b48280 nt!PpmPerfRecordUtility+0xaf
82b3bb10 82b06f6d 82b06f02 00000000 00000000 nt!PpmCheckRecordAllUtility+0xd2
82b3bb14 82b06f02 00000000 00000000 00000000 nt!PpmCheckRun+0x5a
82b3bb38 82a7f04d 82b4cc58 00000000 09ab8dd9 nt!PpmCheckStart+0x4d
82b3bb7c 82a7eff1 82b3ed20 82b3bca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b3bc68 82a7eeae 82b3ed20 82b3bca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b3bcdc 82a7d20e 00096165 8549d5c0 82b48280 nt!KiTimerExpiration+0x25c
82b3bd20 82a7d038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b3bd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PpmPerfRecordUtility+af
82b07b40 8b511c mov edx,dword ptr [ecx+1Ch]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PpmPerfRecordUtility+af
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cacf
FAILURE_BUCKET_ID: 0xA_nt!PpmPerfRecordUtility+af
BUCKET_ID: 0xA_nt!PpmPerfRecordUtility+af
Followup: MachineOwner
---------
Please run Memtest 86 to test your RAM.
RAM - Test with Memtest86+
Please remove any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads
While you are troubleshooting, I recommend that you uninstall Comodo using the Comodo uninstall tool. Turn Windows Firewall on. You can reinstall Comodo once you have your system running smoothly and try it.
What antivirus are you using?
I also find some old drivers. Out of date drivers can and do corrupt memory and causes crashes. Up dtate these driver or uninstall the obsolete software. The drivers in red font are way obsolete.
Apfiltr.sys Fri Mar 14 08:23:10
2008
b57nd60x.sys Sun Apr 26 07:15:34 2009
bcmwl6.sys Tue Jul 07 20:44:47 2009
CHDRT32.sys Mon Jun 15 13:46:19 2009
giveio.sys Wed Apr 03 22:33:25 1996
iaStor.sys Thu Jun 04 21:42:33 2009
pcouffin.sys Tue Dec 05 09:39:53 2006
PxHelp20.sys Wed Mar 12 21:57:44 2008
If you need help updating your drivers, please post back.