Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Help BSOD

23 Dec 2010   #1
panais

Windows 7 Ultimate 64bit SP1
 
 
Help BSOD

I get a bluescreen
I upload my minidump so please help.
HELP!!
Anyone?


My System SpecsSystem Spec
.
28 Dec 2010   #2
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Hi panais. Sorry you are having problems. Please read this thread, run the tool and upload the files it generates to us. This will give us a better look at your system. https://www.sevenforums.com/crashes-d...tructions.html

I looked at all three dumps and each shows a different error code. The usually means a hardware/hardware related problem (drivers). All three dumps blame ntkrnlmp.exe, which is one of the Windows system core files and very unlikely to be the cause.
Quote:
Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Error code A, IRQL_NOT_LESS_OR_EQUAL. Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.

Error code 3B, SYSTEM_SERVICE_EXCEPTION. Usual causes: System service, Device driver, graphics driver, ?memory.


Uninstall any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads. Select uninstall; do NOT select reinstall.

Here is a free alternative CD virtualization program that does not use the sptd.sys driver.
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview

I find the following out of date drivers loaded on your system. Those in red font are really obsolete. Outdated drivers can and do cause conflicts, memory corruption and BSOD's. Update these drivers or uninstall the software they are associated with.
Quote:
ElbyCDFL.sys Thu Dec 14 16:22:27 2006 - ElbyCDIO Filter Driver. Cdrtools (Cdrecord) release information. Uninsatll this software. Download and install the latest version.

ElbyCDIO.sys Tue Feb 17 12:11:23 2009 - CDRTools/ElbyCDIO/DVD Region Killer/VirtualCloneDrive (elby CloneDVD™ 2). Cdrtools (Cdrecord) release information. See above.

Rt64win7.sys Thu Feb 26 04:04:13 2009 - Rt64win7.sys - Realtek 8101E/8168/8169 Network Driver Interface Specification 6.20 64-bit Driver. Latest PCIe GBE (GigaBit Ethernet) drivers here: Realtek.
Uninstall sptd,sys, update or eliminate the above drivers, reboot and let's see how your system does. Post back and update us. If you get another BSOD, completely uninstall Comodo. Download and install Revo Uninstaller (free) to remove Comodo. Make sure Windows firewall is turned on.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Thu Dec 23 12:24:50.183 2010 (GMT-5)
System Uptime: 0 days 0:00:33.134
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cb54a1, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cb54a1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiApcInterrupt+1f1
fffff800`02cb54a1 48cf            iretq

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f100e0
 ffffffffffffffff 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff880068f31a8 -- (.exr 0xfffff880068f31a8)
ExceptionAddress: fffff80002cb54a1 (nt!KiApcInterrupt+0x00000000000001f1)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000008
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880068f3250 -- (.trap 0xfffff880068f3250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000004b rbx=0000000000000000 rcx=0000000000000128
rdx=000000000000019c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cb54a1 rsp=fffff880068f33e8 rbp=fffffa800481e6c1
 r8=00000000000000f1  r9=000000000000009d r10=000000000000009d
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!KiApcInterrupt+0x1f1:
fffff800`02cb54a1 48cf            iretq
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d12929 to fffff80002cd8600

STACK_TEXT:  
fffff880`068f29d8 fffff800`02d12929 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb54a1 00000000`00000000 : nt!KeBugCheckEx
fffff880`068f29e0 fffff800`02cd7c42 : fffff880`068f31a8 00000000`0000019d fffff880`068f3250 00000000`000000a8 : nt!KiDispatchException+0x1b9
fffff880`068f3070 fffff800`02cd654a : 00000000`00000000 fffffa80`0481e650 fffffa80`0481f970 00000000`000000a8 : nt!KiExceptionDispatch+0xc2
fffff880`068f3250 fffff800`02cb54a1 : fffffa80`04817186 00000000`00000000 00000000`00000200 00000001`068f3410 : nt!KiGeneralProtectionFault+0x10a
fffff880`068f33e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiApcInterrupt+1f1
fffff800`02cb54a1 48cf            iretq

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiApcInterrupt+1f1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiApcInterrupt+1f1

BUCKET_ID:  X64_0x1E_nt!KiApcInterrupt+1f1

Followup: MachineOwner
---------

Debug session time: Thu Dec 23 12:23:34.750 2010 (GMT-5)
System Uptime: 0 days 0:00:31.310
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002c95183}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c95183, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02c95183 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  AtBroker.exe

IRP_ADDRESS:  0000000100000009

TRAP_FRAME:  fffff8800666c1a0 -- (.trap 0xfffff8800666c1a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800666c408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c95183 rsp=fffff8800666c330 rbp=0000000000000000
 r8=fffffa8006780a30  r9=fffff8800666c430 r10=0000000000000002
r11=fffffa8006785720 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xae3:
fffff800`02c95183 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c74b69 to fffff80002c75600

STACK_TEXT:  
fffff880`0666c058 fffff800`02c74b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0666c060 fffff800`02c737e0 : fffffa80`045491a0 fffffa80`0695f1d0 fffffa80`04891b80 fffff880`00e2d7eb : nt!KiBugCheckDispatch+0x69
fffff880`0666c1a0 fffff800`02c95183 : fffffa80`06990060 fffff800`02c7b4da fffffa80`047ee650 fffff880`0666c3d9 : nt!KiPageFault+0x260
fffff880`0666c330 00000000`00000200 : 00000001`00000081 fffff880`0666c408 fffff880`0666c408 0050f0c2`00000000 : nt!IopCompleteRequest+0xae3
fffff880`0666c400 00000001`00000081 : fffff880`0666c408 fffff880`0666c408 0050f0c2`00000000 fffff880`0666c498 : 0x200
fffff880`0666c408 fffff880`0666c408 : fffff880`0666c408 0050f0c2`00000000 fffff880`0666c498 fffff800`02da0000 : 0x1`00000081
fffff880`0666c410 fffff880`0666c408 : 0050f0c2`00000000 fffff880`0666c498 fffff800`02da0000 00000000`00000000 : 0xfffff880`0666c408
fffff880`0666c418 0050f0c2`00000000 : fffff880`0666c498 fffff800`02da0000 00000000`00000000 00000000`00000000 : 0xfffff880`0666c408
fffff880`0666c420 fffff880`0666c498 : fffff800`02da0000 00000000`00000000 00000000`00000000 00000000`000000b8 : 0x50f0c2`00000000
fffff880`0666c428 fffff800`02da0000 : 00000000`00000000 00000000`00000000 00000000`000000b8 fffff800`02df2080 : 0xfffff880`0666c498
fffff880`0666c430 00000000`00000000 : fffffa80`0365c2a0 fffff800`02c79771 fffffa80`047f0800 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageInsert+0xd0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02c737e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------

Debug session time: Thu Dec 23 12:27:13.078 2010 (GMT-5)
System Uptime: 0 days 0:00:43.029
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002c9170c, fffff88006c53d80, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c9170c, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88006c53d80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObfDereferenceObject+2c
fffff800`02c9170c f0480fc11f      lock xadd qword ptr [rdi],rbx

CONTEXT:  fffff88006c53d80 -- (.cxr 0xfffff88006c53d80)
rax=fffffa8006a28bb0 rbx=ffffffffffffffff rcx=0000000000000030
rdx=fffffa8006a26ee1 rsi=0000000000000030 rdi=0000000000000000
rip=fffff80002c9170c rsp=fffff88006c54750 rbp=fffff8a001bdae00
 r8=fffffa8006a26ee0  r9=fffff88002fd3180 r10=fffffa8003750c70
r11=fffffa80054a5010 r12=0000000000000000 r13=0050f0c24f000000
r14=fffffa8006974c00 r15=fffff8a001bdae00
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObfDereferenceObject+0x2c:
fffff800`02c9170c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:002b:00000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002c9170c

STACK_TEXT:  
fffff880`06c534b8 fffff800`02c8bb69 : 00000000`0000003b 00000000`c0000005 fffff800`02c9170c fffff880`06c53d80 : nt!KeBugCheckEx
fffff880`06c534c0 fffff800`02c8b4bc : fffff880`06c54518 fffff880`06c53d80 00000000`00000000 fffff800`02cbab50 : nt!KiBugCheckDispatch+0x69
fffff880`06c53600 fffff800`02cb22ed : fffff800`02e97b4c fffff800`02ddbb3c fffff800`02c1c000 fffff880`06c54518 : nt!KiSystemServiceHandler+0x7c
fffff880`06c53640 fffff800`02cb9950 : fffff800`02ddc1b0 fffff880`06c536b8 fffff880`06c54518 fffff800`02c1c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`06c53670 fffff800`02cc68df : fffff880`06c54518 fffff880`06c53d80 fffff880`00000000 00000000`00000004 : nt!RtlDispatchException+0x410
fffff880`06c53d50 fffff800`02c8bc42 : fffff880`06c54518 ffffffff`ffffffff fffff880`06c545c0 00000000`00000030 : nt!KiDispatchException+0x16f
fffff880`06c543e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`02c8b4bc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------

3: kd> lmtsmn
start             end                 module name
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02d76000 fffff880`02e00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043cd000 fffff880`043e3000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff0000 fffff880`00ffb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fbd000 fffff880`00fc6000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00ff0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04553000 fffff880`04573000   AtihdW76 AtihdW76.sys Mon Aug 16 06:41:02 2010 (4C6915BE)
fffff880`04807000 fffff880`04fdd000   atikmdag atikmdag.sys Tue Sep 28 21:41:26 2010 (4CA29946)
fffff880`04051000 fffff880`0409c000   atikmpag atikmpag.sys Tue Sep 28 21:14:49 2010 (4CA29309)
fffff880`04365000 fffff880`043aa000   aysuml2m aysuml2m.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`02cbf000 fffff880`02cc6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c00000 fffff880`02c11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02776000 fffff880`02794000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      unavailable (00000000)
fffff880`02c1d000 fffff880`02c47000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013b1000 fffff880`013e1000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d41000 fffff880`00d9f000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02c74000 fffff880`02cb6000   cmdguard cmdguard.sys Fri Sep 10 18:07:10 2010 (4C8AAC0E)
fffff880`02d6b000 fffff880`02d76000   cmdhlp   cmdhlp.sys   Fri Sep 10 18:06:39 2010 (4C8AABEF)
fffff880`014ab000 fffff880`0151e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043aa000 fffff880`043ba000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0445c000 fffff880`0446a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e24000 fffff880`03ea7000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03ea7000 fffff880`03ec5000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e15000 fffff880`03e24000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b0000 fffff880`045d2000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`045d8000 fffff880`045e1000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0446a000 fffff880`04476000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`045e1000 fffff880`045f4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02c11000 fffff880`02c1d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0409c000 fffff880`04190000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04190000 fffff880`041d6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0434a000 fffff880`04358000   ElbyCDFL ElbyCDFL.sys Thu Dec 14 16:22:27 2006 (4581C093)
fffff880`03e0b000 fffff880`03e15000   ElbyCDIO ElbyCDIO.sys Tue Feb 17 12:11:23 2009 (499AEFBB)
fffff880`00e00000 fffff880`00e14000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00d9f000 fffff880`00deb000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0152f000 fffff880`01539000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015bf000 fffff880`015f9000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04358000 fffff880`04365000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff880`043ba000 fffff880`043cd000   GenericMount GenericMount.sys Fri Aug 28 18:59:50 2009 (4A986166)
fffff800`031f8000 fffff800`03241000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041d6000 fffff880`041fa000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04400000 fffff880`0445c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`01416000 fffff880`0142f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`045f6000 fffff880`045fe080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0402c000 fffff880`0403a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`026ae000 fffff880`02776000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016d5000 fffff880`016de000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f46000 fffff880`03f5e000   inspect  inspect.sys  Fri Sep 10 18:07:36 2010 (4C8AAC28)
fffff880`0403b000 fffff880`04051000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04fea000 fffff880`04ff9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`01200000 fffff880`0120e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba2000 fffff800`00ba5000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`04478000 fffff880`044bb000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01491000 fffff880`014ab000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045d2000 fffff880`045d7200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`013e1000 fffff880`013f6000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`02681000 fffff880`02696000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00deb000 fffff880`00dff000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`0265e000 fffff880`02681000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce9000 fffff880`00d2d000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02650000 fffff880`0265e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04000000 fffff880`0400f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03ec5000 fffff880`03ed2000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fa3000 fffff880`00fbd000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c47000 fffff880`02c74000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`02794000 fffff880`027c1000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02600000 fffff880`0264e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`027c1000 fffff880`027e4000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02d24000 fffff880`02d2f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011b9000 fffff880`011c3000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01433000 fffff880`01491000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e00000 fffff880`03e0b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ee000 fffff880`01800000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016e4000 fffff880`017d6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04224000 fffff880`04230000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04230000 fffff880`0425f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0453e000 fffff880`04553000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f5e000 fffff880`03f6d000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ed2000 fffff880`03f17000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02d2f000 fffff880`02d40000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fed000 fffff880`03ff9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c1c000 fffff800`031f8000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
fffff880`0120e000 fffff880`013b1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02cb6000 fffff880`02cbf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03f20000 fffff880`03f46000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011d0000 fffff880`011e5000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00efd000 fffff880`00f30000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f8c000 fffff880`00f93000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f93000 fffff880`00fa3000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0151e000 fffff880`0152f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05c29000 fffff880`05ccf000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04573000 fffff880`045b0000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d2d000 fffff880`00d41000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04200000 fffff880`04224000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0425f000 fffff880`0427a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0427a000 fffff880`0429b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`043e3000 fffff880`043fd000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03f9c000 fffff880`03fed000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0429b000 fffff880`042a6000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02d09000 fffff880`02d12000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d12000 fffff880`02d1b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d1b000 fffff880`02d24000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01585000 fffff880`015bf000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02696000 fffff880`026ae000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04318000 fffff880`0434a000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`0118a000 fffff880`011b9000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05ccf000 fffff880`05cda000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017e6000 fffff880`017ee000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0105b000 fffff880`01181000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`05eca000 fffff880`05f62000   srv      srv.sys      Tue Dec 08 03:32:55 2009 (4B1E0F37)
fffff880`05d19000 fffff880`05d82000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`05cda000 fffff880`05d07000   srvnet   srvnet.sys   Tue Dec 08 03:32:26 2009 (4B1E0F1A)
fffff880`042a6000 fffff880`042a7480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`00e14000 fffff880`00e42000   symsnap  symsnap.sys  Tue Sep 15 17:02:11 2009 (4AB000D3)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`05d07000 fffff880`05d19000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d5e000 fffff880`02d6b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02d40000 fffff880`02d5e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03f88000 fffff880`03f9c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00470000 fffff960`0047a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00cc0000 fffff880`00ce6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044d2000 fffff880`044e4000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0400f000 fffff880`0402c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`045f4000 fffff880`045f5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04307000 fffff880`04318000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044e4000 fffff880`0453e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`042b1000 fffff880`04307000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04fdd000 fffff880`04fea000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011c3000 fffff880`011d0000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02cc6000 fffff880`02cd4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02cd4000 fffff880`02cf9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d6000 fffff880`017e6000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`011e5000 fffff880`011fa000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f30000 fffff880`00f8c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01539000 fffff880`01585000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03f6d000 fffff880`03f88000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02cf9000 fffff880`02d09000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4a000 fffff880`00eee000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eee000 fffff880`00efd000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f17000 fffff880`03f20000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`044bb000 fffff880`044bfd00   WmBEnum  WmBEnum.sys  Tue Apr 27 16:10:19 2010 (4BD744AB)
fffff880`01181000 fffff880`0118a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`044c0000 fffff880`044d1480   WmXlCore WmXlCore.sys Tue Apr 27 16:09:26 2010 (4BD74476)

Unloaded modules:
fffff880`01416000 fffff880`01424000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01424000 fffff880`01430000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013e1000 fffff880`013ea000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013ea000 fffff880`013fd000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
28 Dec 2010   #3
panais

Windows 7 Ultimate 64bit SP1
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
Hi panais. Sorry you are having problems. Please read this thread, run the tool and upload the files it generates to us. This will give us a better look at your system. https://www.sevenforums.com/crashes-d...tructions.html

I looked at all three dumps and each shows a different error code. The usually means a hardware/hardware related problem (drivers). All three dumps blame ntkrnlmp.exe, which is one of the Windows system core files and very unlikely to be the cause.
Quote:
Error code 1E, KMODE_EXCEPTION_NOT_HANDLED. Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS.

Error code A, IRQL_NOT_LESS_OR_EQUAL. Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.

Error code 3B, SYSTEM_SERVICE_EXCEPTION. Usual causes: System service, Device driver, graphics driver, ?memory.


Uninstall any CD virtualization programs such as Daemon Tools and Alcohol 120%. They use a driver, found in your dmp, sptd.sys, that is notorious for causing BSODs. Use this SPTD uninstaller when you're done: DuplexSecure - Downloads. Select uninstall; do NOT select reinstall.

Here is a free alternative CD virtualization program that does not use the sptd.sys driver.
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview

I find the following out of date drivers loaded on your system. Those in red font are really obsolete. Outdated drivers can and do cause conflicts, memory corruption and BSOD's. Update these drivers or uninstall the software they are associated with.
Quote:
ElbyCDFL.sys Thu Dec 14 16:22:27 2006 - ElbyCDIO Filter Driver. Cdrtools (Cdrecord) release information. Uninsatll this software. Download and install the latest version.

ElbyCDIO.sys Tue Feb 17 12:11:23 2009 - CDRTools/ElbyCDIO/DVD Region Killer/VirtualCloneDrive (elby CloneDVD™ 2). Cdrtools (Cdrecord) release information. See above.

Rt64win7.sys Thu Feb 26 04:04:13 2009 - Rt64win7.sys - Realtek 8101E/8168/8169 Network Driver Interface Specification 6.20 64-bit Driver. Latest PCIe GBE (GigaBit Ethernet) drivers here: Realtek.
Uninstall sptd,sys, update or eliminate the above drivers, reboot and let's see how your system does. Post back and update us. If you get another BSOD, completely uninstall Comodo. Download and install Revo Uninstaller (free) to remove Comodo. Make sure Windows firewall is turned on.
Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Thu Dec 23 12:24:50.183 2010 (GMT-5)
System Uptime: 0 days 0:00:33.134
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002cb54a1, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cb54a1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!KiApcInterrupt+1f1
fffff800`02cb54a1 48cf            iretq

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f100e0
 ffffffffffffffff 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff880068f31a8 -- (.exr 0xfffff880068f31a8)
ExceptionAddress: fffff80002cb54a1 (nt!KiApcInterrupt+0x00000000000001f1)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000008
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff880068f3250 -- (.trap 0xfffff880068f3250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000004b rbx=0000000000000000 rcx=0000000000000128
rdx=000000000000019c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cb54a1 rsp=fffff880068f33e8 rbp=fffffa800481e6c1
 r8=00000000000000f1  r9=000000000000009d r10=000000000000009d
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po nc
nt!KiApcInterrupt+0x1f1:
fffff800`02cb54a1 48cf            iretq
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002d12929 to fffff80002cd8600

STACK_TEXT:  
fffff880`068f29d8 fffff800`02d12929 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb54a1 00000000`00000000 : nt!KeBugCheckEx
fffff880`068f29e0 fffff800`02cd7c42 : fffff880`068f31a8 00000000`0000019d fffff880`068f3250 00000000`000000a8 : nt!KiDispatchException+0x1b9
fffff880`068f3070 fffff800`02cd654a : 00000000`00000000 fffffa80`0481e650 fffffa80`0481f970 00000000`000000a8 : nt!KiExceptionDispatch+0xc2
fffff880`068f3250 fffff800`02cb54a1 : fffffa80`04817186 00000000`00000000 00000000`00000200 00000001`068f3410 : nt!KiGeneralProtectionFault+0x10a
fffff880`068f33e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiApcInterrupt+1f1
fffff800`02cb54a1 48cf            iretq

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!KiApcInterrupt+1f1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiApcInterrupt+1f1

BUCKET_ID:  X64_0x1E_nt!KiApcInterrupt+1f1

Followup: MachineOwner
---------

Debug session time: Thu Dec 23 12:23:34.750 2010 (GMT-5)
System Uptime: 0 days 0:00:31.310
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002c95183}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c95183, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ead0e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02c95183 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  AtBroker.exe

IRP_ADDRESS:  0000000100000009

TRAP_FRAME:  fffff8800666c1a0 -- (.trap 0xfffff8800666c1a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800666c408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c95183 rsp=fffff8800666c330 rbp=0000000000000000
 r8=fffffa8006780a30  r9=fffff8800666c430 r10=0000000000000002
r11=fffffa8006785720 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xae3:
fffff800`02c95183 488b09          mov     rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c74b69 to fffff80002c75600

STACK_TEXT:  
fffff880`0666c058 fffff800`02c74b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0666c060 fffff800`02c737e0 : fffffa80`045491a0 fffffa80`0695f1d0 fffffa80`04891b80 fffff880`00e2d7eb : nt!KiBugCheckDispatch+0x69
fffff880`0666c1a0 fffff800`02c95183 : fffffa80`06990060 fffff800`02c7b4da fffffa80`047ee650 fffff880`0666c3d9 : nt!KiPageFault+0x260
fffff880`0666c330 00000000`00000200 : 00000001`00000081 fffff880`0666c408 fffff880`0666c408 0050f0c2`00000000 : nt!IopCompleteRequest+0xae3
fffff880`0666c400 00000001`00000081 : fffff880`0666c408 fffff880`0666c408 0050f0c2`00000000 fffff880`0666c498 : 0x200
fffff880`0666c408 fffff880`0666c408 : fffff880`0666c408 0050f0c2`00000000 fffff880`0666c498 fffff800`02da0000 : 0x1`00000081
fffff880`0666c410 fffff880`0666c408 : 0050f0c2`00000000 fffff880`0666c498 fffff800`02da0000 00000000`00000000 : 0xfffff880`0666c408
fffff880`0666c418 0050f0c2`00000000 : fffff880`0666c498 fffff800`02da0000 00000000`00000000 00000000`00000000 : 0xfffff880`0666c408
fffff880`0666c420 fffff880`0666c498 : fffff800`02da0000 00000000`00000000 00000000`00000000 00000000`000000b8 : 0x50f0c2`00000000
fffff880`0666c428 fffff800`02da0000 : 00000000`00000000 00000000`00000000 00000000`000000b8 fffff800`02df2080 : 0xfffff880`0666c498
fffff880`0666c430 00000000`00000000 : fffffa80`0365c2a0 fffff800`02c79771 fffffa80`047f0800 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageInsert+0xd0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02c737e0 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------

Debug session time: Thu Dec 23 12:27:13.078 2010 (GMT-5)
System Uptime: 0 days 0:00:43.029
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002c9170c, fffff88006c53d80, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c9170c, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88006c53d80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObfDereferenceObject+2c
fffff800`02c9170c f0480fc11f      lock xadd qword ptr [rdi],rbx

CONTEXT:  fffff88006c53d80 -- (.cxr 0xfffff88006c53d80)
rax=fffffa8006a28bb0 rbx=ffffffffffffffff rcx=0000000000000030
rdx=fffffa8006a26ee1 rsi=0000000000000030 rdi=0000000000000000
rip=fffff80002c9170c rsp=fffff88006c54750 rbp=fffff8a001bdae00
 r8=fffffa8006a26ee0  r9=fffff88002fd3180 r10=fffffa8003750c70
r11=fffffa80054a5010 r12=0000000000000000 r13=0050f0c24f000000
r14=fffffa8006974c00 r15=fffff8a001bdae00
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObfDereferenceObject+0x2c:
fffff800`02c9170c f0480fc11f      lock xadd qword ptr [rdi],rbx ds:002b:00000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskhost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002c9170c

STACK_TEXT:  
fffff880`06c534b8 fffff800`02c8bb69 : 00000000`0000003b 00000000`c0000005 fffff800`02c9170c fffff880`06c53d80 : nt!KeBugCheckEx
fffff880`06c534c0 fffff800`02c8b4bc : fffff880`06c54518 fffff880`06c53d80 00000000`00000000 fffff800`02cbab50 : nt!KiBugCheckDispatch+0x69
fffff880`06c53600 fffff800`02cb22ed : fffff800`02e97b4c fffff800`02ddbb3c fffff800`02c1c000 fffff880`06c54518 : nt!KiSystemServiceHandler+0x7c
fffff880`06c53640 fffff800`02cb9950 : fffff800`02ddc1b0 fffff880`06c536b8 fffff880`06c54518 fffff800`02c1c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`06c53670 fffff800`02cc68df : fffff880`06c54518 fffff880`06c53d80 fffff880`00000000 00000000`00000004 : nt!RtlDispatchException+0x410
fffff880`06c53d50 fffff800`02c8bc42 : fffff880`06c54518 ffffffff`ffffffff fffff880`06c545c0 00000000`00000030 : nt!KiDispatchException+0x16f
fffff880`06c543e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSystemServiceHandler+7c
fffff800`02c8b4bc b801000000      mov     eax,1

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

BUCKET_ID:  X64_0x3B_nt!KiSystemServiceHandler+7c

Followup: MachineOwner
---------

3: kd> lmtsmn
start             end                 module name
fffff880`01000000 fffff880`01057000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02d76000 fffff880`02e00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`043cd000 fffff880`043e3000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00ff0000 fffff880`00ffb000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fbd000 fffff880`00fc6000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00ff0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04553000 fffff880`04573000   AtihdW76 AtihdW76.sys Mon Aug 16 06:41:02 2010 (4C6915BE)
fffff880`04807000 fffff880`04fdd000   atikmdag atikmdag.sys Tue Sep 28 21:41:26 2010 (4CA29946)
fffff880`04051000 fffff880`0409c000   atikmpag atikmpag.sys Tue Sep 28 21:14:49 2010 (4CA29309)
fffff880`04365000 fffff880`043aa000   aysuml2m aysuml2m.SYS Tue Jul 14 17:12:55 2009 (4A5CF4D7)
fffff880`02cbf000 fffff880`02cc6000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c00000 fffff880`02c11000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02776000 fffff880`02794000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00650000 fffff960`00677000   cdd      cdd.dll      unavailable (00000000)
fffff880`02c1d000 fffff880`02c47000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`013b1000 fffff880`013e1000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d41000 fffff880`00d9f000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`02c74000 fffff880`02cb6000   cmdguard cmdguard.sys Fri Sep 10 18:07:10 2010 (4C8AAC0E)
fffff880`02d6b000 fffff880`02d76000   cmdhlp   cmdhlp.sys   Fri Sep 10 18:06:39 2010 (4C8AABEF)
fffff880`014ab000 fffff880`0151e000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`043aa000 fffff880`043ba000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0445c000 fffff880`0446a000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03e24000 fffff880`03ea7000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03ea7000 fffff880`03ec5000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03e15000 fffff880`03e24000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01400000 fffff880`01416000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`045b0000 fffff880`045d2000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`045d8000 fffff880`045e1000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0446a000 fffff880`04476000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`045e1000 fffff880`045f4000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`02c11000 fffff880`02c1d000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0409c000 fffff880`04190000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`04190000 fffff880`041d6000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0434a000 fffff880`04358000   ElbyCDFL ElbyCDFL.sys Thu Dec 14 16:22:27 2006 (4581C093)
fffff880`03e0b000 fffff880`03e15000   ElbyCDIO ElbyCDIO.sys Tue Feb 17 12:11:23 2009 (499AEFBB)
fffff880`00e00000 fffff880`00e14000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00d9f000 fffff880`00deb000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0152f000 fffff880`01539000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015bf000 fffff880`015f9000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0168b000 fffff880`016d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`04358000 fffff880`04365000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff880`043ba000 fffff880`043cd000   GenericMount GenericMount.sys Fri Aug 28 18:59:50 2009 (4A986166)
fffff800`031f8000 fffff800`03241000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`041d6000 fffff880`041fa000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04400000 fffff880`0445c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`01416000 fffff880`0142f000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`045f6000 fffff880`045fe080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0402c000 fffff880`0403a000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`026ae000 fffff880`02776000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`016d5000 fffff880`016de000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03f46000 fffff880`03f5e000   inspect  inspect.sys  Fri Sep 10 18:07:36 2010 (4C8AAC28)
fffff880`0403b000 fffff880`04051000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04fea000 fffff880`04ff9000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`01200000 fffff880`0120e000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba2000 fffff800`00ba5000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`04478000 fffff880`044bb000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`01491000 fffff880`014ab000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01660000 fffff880`0168b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`045d2000 fffff880`045d7200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`013e1000 fffff880`013f6000   LHidFilt LHidFilt.Sys Tue Aug 24 13:21:36 2010 (4C73FFA0)
fffff880`02681000 fffff880`02696000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00deb000 fffff880`00dff000   LMouFilt LMouFilt.Sys Tue Aug 24 13:21:43 2010 (4C73FFA7)
fffff880`0265e000 fffff880`02681000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00ce9000 fffff880`00d2d000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`02650000 fffff880`0265e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04000000 fffff880`0400f000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`03ec5000 fffff880`03ed2000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fa3000 fffff880`00fbd000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c47000 fffff880`02c74000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`02794000 fffff880`027c1000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`02600000 fffff880`0264e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`027c1000 fffff880`027e4000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`02d24000 fffff880`02d2f000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011b9000 fffff880`011c3000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01433000 fffff880`01491000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03e00000 fffff880`03e0b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017ee000 fffff880`01800000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016e4000 fffff880`017d6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04224000 fffff880`04230000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04230000 fffff880`0425f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0453e000 fffff880`04553000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f5e000 fffff880`03f6d000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ed2000 fffff880`03f17000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01600000 fffff880`01660000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02d2f000 fffff880`02d40000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fed000 fffff880`03ff9000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c1c000 fffff800`031f8000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
fffff880`0120e000 fffff880`013b1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02cb6000 fffff880`02cbf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03f20000 fffff880`03f46000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`011d0000 fffff880`011e5000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00efd000 fffff880`00f30000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f8c000 fffff880`00f93000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00f93000 fffff880`00fa3000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0151e000 fffff880`0152f000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05c29000 fffff880`05ccf000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04573000 fffff880`045b0000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d2d000 fffff880`00d41000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04200000 fffff880`04224000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0425f000 fffff880`0427a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0427a000 fffff880`0429b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`043e3000 fffff880`043fd000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03f9c000 fffff880`03fed000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`0429b000 fffff880`042a6000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02d09000 fffff880`02d12000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d12000 fffff880`02d1b000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02d1b000 fffff880`02d24000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01585000 fffff880`015bf000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02696000 fffff880`026ae000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`04318000 fffff880`0434a000   Rt64win7 Rt64win7.sys Thu Feb 26 04:04:13 2009 (49A65B0D)
fffff880`0118a000 fffff880`011b9000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`05ccf000 fffff880`05cda000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`017e6000 fffff880`017ee000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0105b000 fffff880`01181000   sptd     sptd.sys     Sun Oct 11 16:55:14 2009 (4AD24632)
fffff880`05eca000 fffff880`05f62000   srv      srv.sys      Tue Dec 08 03:32:55 2009 (4B1E0F37)
fffff880`05d19000 fffff880`05d82000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`05cda000 fffff880`05d07000   srvnet   srvnet.sys   Tue Dec 08 03:32:26 2009 (4B1E0F1A)
fffff880`042a6000 fffff880`042a7480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`00e14000 fffff880`00e42000   symsnap  symsnap.sys  Tue Sep 15 17:02:11 2009 (4AB000D3)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`05d07000 fffff880`05d19000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02d5e000 fffff880`02d6b000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02d40000 fffff880`02d5e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03f88000 fffff880`03f9c000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00470000 fffff960`0047a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`00cc0000 fffff880`00ce6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`044d2000 fffff880`044e4000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0400f000 fffff880`0402c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`045f4000 fffff880`045f5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04307000 fffff880`04318000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`044e4000 fffff880`0453e000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`042b1000 fffff880`04307000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`04fdd000 fffff880`04fea000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`011c3000 fffff880`011d0000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02cc6000 fffff880`02cd4000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02cd4000 fffff880`02cf9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017d6000 fffff880`017e6000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`011e5000 fffff880`011fa000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f30000 fffff880`00f8c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01539000 fffff880`01585000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03f6d000 fffff880`03f88000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02cf9000 fffff880`02d09000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4a000 fffff880`00eee000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eee000 fffff880`00efd000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03f17000 fffff880`03f20000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00010000 fffff960`0031f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`044bb000 fffff880`044bfd00   WmBEnum  WmBEnum.sys  Tue Apr 27 16:10:19 2010 (4BD744AB)
fffff880`01181000 fffff880`0118a000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`044c0000 fffff880`044d1480   WmXlCore WmXlCore.sys Tue Apr 27 16:09:26 2010 (4BD74476)

Unloaded modules:
fffff880`01416000 fffff880`01424000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`01424000 fffff880`01430000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013e1000 fffff880`013ea000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
fffff880`013ea000 fffff880`013fd000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
Hello Carl thanks for helping me.
Ok i will start first with daemon tools remove (i never had any problems with daemon)but im sure you know better than me.
A! before few days i use the Auto-Tune in my Ati Catalyst (view attachment default settings)
The Auto-Tune set my graphic card to Gpu 996MHz and Memory clock 1090MHz
If i remember well the BSOD started from that point.
But again iam not sure.
My System SpecsSystem Spec
.

28 Dec 2010   #4
CarlTR6

Windows 7 Ultimate 32 bit
 
 

You are very welcome for the help.

Try setting them back to default values and see if the BSOD's go away.

It is not a matter of Daemon Tools working properly. It is the sptd.sys driver that creates conflicts on a lot of Win 7 systems and causes BSOD's. When troubleshooting, the idea is to remove all possible BSOD causes.
My System SpecsSystem Spec
28 Dec 2010   #5
panais

Windows 7 Ultimate 64bit SP1
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
You are very welcome for the help.

Try setting them back to default values and see if the BSOD's go away.

It is not a matter of Daemon Tools working properly. It is the sptd.sys driver that creates conflicts on a lot of Win 7 systems and causes BSOD's. When troubleshooting, the idea is to remove all possible BSOD causes.
From the first time i had the BSOD i full format,install win7,programs etc.The graphic card is set to default values.BUT i have this strange issue....i work on my pc,internet browsing,downloading etc,then i go away and let the pc ON for downloads,and when i come back the pc is still on and running BUT when i switch on the T.V. i have no signal/icon like someone removed the HDMI cable from the t.v.
So i press the reset button and everything is back to <<normal>> until the next time.
For now i unistall the daemon tools and wait to see the results.
If happen again i will replace my hyperX ram with my value ram.
If happen again i will replace my velociraptor with my simple sata 7200rpm hard disk,full format,install win7,programs etc.
If happen again i will replace bios back to the default factory f1 bios.
If happen again i will take a big hammer and i will <<FIX>> the pc!!
-----------------------------------------------------------------
By the way i get also this kind of loading (view attachment) when i try to open my others hard disks.
Is that normal?
----------------------------------------------------------------------
I found that too (attachment named Trojanmaybe) and i dont know if is false alert.
My System SpecsSystem Spec
29 Dec 2010   #6
CarlTR6

Windows 7 Ultimate 32 bit
 
 

Panais, I am no malware expert. I suggest you post this in a new thread in the System Security section. System Security - Windows 7 Forums. There are some really good security Gurus there.
My System SpecsSystem Spec
29 Dec 2010   #7
panais

Windows 7 Ultimate 64bit SP1
 
 

Quote   Quote: Originally Posted by CarlTR6 View Post
Panais, I am no malware expert. I suggest you post this in a new thread in the System Security section. System Security - Windows 7 Forums. There are some really good security Gurus there.
I Removed daemon tools but i still have the same problem.
My System SpecsSystem Spec
Reply

 Help BSOD




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 21:49.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App