Hi,
I've included all the files you have asked for to diagnose the problem.
The laptop had Windows 7 Home, but then I upgraded to Windows 7 Ultimate (x64) three days ago (through Windows Anytime Upgrade) thinking it would eliminate the BsOD. It hasn't. This began happening recently, but now it happens frequently. I have not installed any new programs when this problem began. My version of Windows Ultimate is a full retail version I purchased.
I purchased this laptop from my brother, but it shouldn't be more than a year old.
Thank you for your help,
Myers
You have three glaring problems
Your Avast , old drivers, and Zone Alarm (NETIO.sys).
I would remove avast and replace with Microsoft security essentials and the win 7 firewall. Remove Zone alarm.
The most recent crash was probably caused by an interaction between ZAP and Avast.
http://files.avast.com/files/eng/aswclear5.exe
http://www.microsoft.com/security_essentials/
http://download.zonealarm.com/bin/fr...cpes_clean.exe
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\021011-30825-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
Debug session time: Thu Feb 10 10:40:47.378 2011 (GMT-5)
System Uptime: 0 days 19:25:16.718
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 406f8, fffff80002c40ec0}
Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000406f8
Arg4: fffff80002c40ec0
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c77ca9 to fffff80002c78740
STACK_TEXT:
fffff800`04964d28 fffff800`02c77ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
fffff800`04964d30 fffff800`02c76172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04964e70 fffff800`02c40ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`092c7b40 fffff880`01f72c5a : 00730074`0072006f 076be4f2`00000000 005f0067`00000012 00690074`0070006f : nt!SeAccessCheckFromState+0x58
fffff880`092c8230 fffff880`01f7094f : 00610072`0054006c 006f0070`0073006e 00410073`00740072 00610068`0070006c : NETIO!CompareSecurityContexts+0x6a
fffff880`092c82a0 fffff880`01f729b5 : 005f0067`00000028 00610072`00540066 006f0070`0073006e 00530073`00740072 : NETIO!MatchValues+0xef
fffff880`092c82f0 fffff880`01f72845 : fffffa80`07c5c1d0 fffffa80`073ff110 fffff880`092c8518 fffff880`092c8c50 : NETIO!FilterMatch+0x95
fffff880`092c8340 fffff880`01f73ccb : 00000000`00000000 00000000`00000000 fffff880`092c8c50 fffff880`092c8500 : NETIO!IndexListClassify+0x69
fffff880`092c83c0 fffff880`0203f417 : fffff880`092c8898 fffff880`092c8898 fffff880`092c95d0 fffffa80`0845fd50 : NETIO!KfdClassify+0xa4e
fffff880`092c8730 fffff880`0203883e : fffff880`02147690 00000000`00000000 fffffa80`064e0410 00000000`00000000 : tcpip!WfpAleClassify+0x57
fffff880`092c8770 fffff880`02037cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`092c8e80 fffff880`0203b886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`092c9150 fffff880`0203e5e4 : 00000000`00000000 fffff880`092c9588 fffff880`092c9590 00000000`00000001 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`092c9240 fffff880`02037019 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`092c94b0 fffff880`02065ef6 : 00000000`00000000 fffff800`02d30002 fffffa80`03f48900 fffffa80`05d614c1 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`092c9680 fffff880`0206b1ee : fffffa80`03f4c900 fffff880`01f6e804 fffff880`0216d9a0 fffffa80`064e0410 : tcpip!IppSendDatagramsCommon+0x526
fffff880`092c9950 fffff880`02035db8 : fffffa80`064e0410 fffffa80`0845fd50 fffffa80`0845fd50 fffffa80`03f4c900 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`092c9990 fffff880`0203632d : fffffa80`0435f680 fffffa80`0421f740 fffff880`092ca2e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`092c9d10 fffff880`02035fb5 : fffff880`092ca240 00000000`000014c1 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
fffff880`092ca100 fffff800`02c87e5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`092ca130 fffff880`02036578 : fffff880`02035fa0 fffff880`092ca240 fffff880`092ca402 fffffa80`040cddc0 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`092ca210 fffff880`03615f45 : fffffa80`05721120 fffffa80`0697c350 fffffa80`043d6cd0 fffffa80`064858de : tcpip!UdpTlProviderSendMessages+0x78
fffff880`092ca290 fffff880`03615ff2 : 00000000`00000002 fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`064858a8 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`092ca370 fffff880`023641a8 : fffffa80`074bd980 ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`092ca3a0 fffffa80`074bd980 : ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 : aswTdi+0x11a8
fffff880`092ca3a8 ffffffff`ffffffff : fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 : 0xfffffa80`074bd980
fffff880`092ca3b0 fffffa80`05d3e7c0 : fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b : 0xffffffff`ffffffff
fffff880`092ca3b8 fffffa80`074bd980 : fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 : 0xfffffa80`05d3e7c0
fffff880`092ca3c0 fffffa80`05758900 : fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e : 0xfffffa80`074bd980
fffff880`092ca3c8 fffffa80`064e14c1 : ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 : 0xfffffa80`05758900
fffff880`092ca3d0 ffffc114`ac10130b : ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 : 0xfffffa80`064e14c1
fffff880`092ca3d8 ffff0000`0b1a4025 : 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 : 0xffffc114`ac10130b
fffff880`092ca3e0 00000000`0000003e : fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 : 0xffff0000`0b1a4025
fffff880`092ca3e8 fffffa80`043b01a0 : fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 : 0x3e
fffff880`092ca3f0 fffffa80`05d3e7c0 : fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 : 0xfffffa80`043b01a0
fffff880`092ca3f8 fffffa80`074bd820 : fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a : 0xfffffa80`05d3e7c0
fffff880`092ca400 fffffa80`05cdfbc0 : fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 : 0xfffffa80`074bd820
fffff880`092ca408 fffff880`02364647 : fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 : 0xfffffa80`05cdfbc0
fffff880`092ca410 fffff880`092ca4e0 : fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 : aswTdi+0x1647
fffff880`092ca418 fffff880`014a671a : fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 fffffa80`064dd710 : 0xfffff880`092ca4e0
fffff880`092ca420 fffff880`014a6542 : 00000000`00000000 fffff880`092ca500 fffffa80`064dd710 fffffa80`074bd820 : netbt!GetIrp+0x52
fffff880`092ca450 fffff880`014a6f61 : fffffa80`064858a8 fffffa80`064858a8 fffffa80`040063f0 fffff880`092ca550 : netbt!TdiSendDatagram+0x187
fffff880`092ca4c0 fffff880`014b3329 : fffffa80`04a17e50 fffffa80`064856f0 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
fffff880`092ca550 fffff880`014b30e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`014dc114 : netbt!UdpSendResponse+0x4e0
fffff880`092ca5d0 fffff880`014a7be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`092ca700 fffff880`014a5b47 : 00000000`00000032 fffffa80`065fc90c 00000000`00000032 fffff880`092ca902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`092ca740 fffff880`02369443 : fffffa80`03dfa680 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`092ca7e0 fffffa80`03dfa680 : 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 : aswTdi+0x6443
fffff880`092ca7e8 00000000`00000032 : fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 00000000`00000004 : 0xfffffa80`03dfa680
fffff880`092ca7f0 fffff880`0236e820 : fffffa80`03dfa680 00000000`00000000 00000000`00000004 00000000`00000032 : 0x32
fffff880`092ca7f8 fffffa80`03dfa680 : 00000000`00000000 00000000`00000004 00000000`00000032 00000000`00000032 : aswTdi+0xb820
fffff880`092ca800 00000000`00000000 : 00000000`00000004 00000000`00000032 00000000`00000032 fffff880`092ca928 : 0xfffffa80`03dfa680
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01f72c5a 448b442470 mov r8d,dword ptr [rsp+70h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!CompareSecurityContexts+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
Followup: MachineOwner
---------
Old drivers needing update
Code:
iirsp.sys 12/13/2005 16:47:54 0x439f418a fffff880`0174a000 fffff880`0175b000 0x00011000
nfrd960.sys 6/6/2006 16:11:48 0x4485ef94 fffff880`016a4000 fffff880`016b4000 0x00010000
adpu320.sys 2/27/2007 19:04:15 0x45e4c6ff fffff880`015bb000 fffff880`015ea000 0x0002f000
adpahci.sys 5/1/2007 12:30:09 0x46377921 fffff880`01565000 fffff880`015bb000 0x00056000
arc.sys 5/24/2007 16:27:55 0x4656035b fffff880`01470000 fffff880`01489000 0x00019000
SiSRaid2.sys 9/24/2008 13:28:20 0x48da86c4 fffff880`01a64000 fffff880`01a72000 0x0000e000
000.fcl 9/26/2008 8:11:22 0x48dcdf7a fffff880`08399000 fffff880`083c4000 0x0002b000
sisraid4.sys 10/1/2008 16:56:04 0x48e3f1f4 fffff880`01a72000 fffff880`01a8a000 0x00018000
adp94xx.sys 12/5/2008 18:54:42 0x4939bf42 fffff880`014ea000 fffff880`01565000 0x0007b000
lsi_fc.sys 12/9/2008 17:46:09 0x493ef531 fffff880`0175b000 fffff880`0177a000 0x0001f000
arcsas.sys 1/14/2009 14:27:37 0x496e3ca9 fffff880`01489000 fffff880`014a4000 0x0001b000
ql2300.sys 1/22/2009 18:05:06 0x4978fba2 fffff880`01824000 fffff880`019c8000 0x001a4000
vsmraid.sys 1/30/2009 20:18:57 0x4983a701 fffff880`01a94000 fffff880`01abe000 0x0002a000
elxstor.sys 2/3/2009 17:52:11 0x4988ca9b fffff880`016c3000 fffff880`0174a000 0x00087000
stexstor.sys 2/17/2009 18:03:36 0x499b4248 fffff880`01a8a000 fffff880`01a94000 0x0000a000
amdsbs.sys 3/20/2009 13:36:03 0x49c3e213 fffff880`0141e000 fffff880`01465000 0x00047000
iaStorV.sys 4/8/2009 11:57:17 0x49dcd76d fffff880`010cf000 fffff880`011ed000 0x0011e000
lsi_scsi.sys 4/16/2009 17:13:50 0x49e7ad9e fffff880`0178d000 fffff880`017ac000 0x0001f000
HpqKbFiltr.sys 4/29/2009 8:48:30 0x49f85aae fffff880`04bd9000 fffff080`04be5000 0xfffff8000000c000
spldr.sys 5/11/2009 11:56:27 0x4a0858bb fffff880`02281000 fffff880`02289000 0x00008000
HpSAMD.sys 5/18/2009 18:43:49 0x4a11f2b5 fffff880`013e0000 fffff880`013f7000 0x00017000
lsi_sas.sys 5/18/2009 19:20:23 0x4a11fb47 fffff880`0122a000 fffff880`01247000 0x0001d000
lsi_sas2.sys 5/18/2009 19:31:48 0x4a11fdf4 fffff880`0177a000 fffff880`0178d000 0x00013000
megasas.sys 5/18/2009 20:09:46 0x4a1206da fffff880`017ac000 fffff880`017b8000 0x0000c000
ql40xx.sys 5/18/2009 20:18:11 0x4a1208d3 fffff880`01a05000 fffff880`01a64000 0x0005f000
MegaSR.sys 5/18/2009 20:25:54 0x4a120aa2 fffff880`01600000 fffff880`016a4000 0x000a4000
amdsata.sys 5/19/2009 12:53:21 0x4a12f211 fffff880`01400000 fffff880`0141e000 0x0001e000
amdxata.sys 5/19/2009 12:56:59 0x4a12f2eb fffff880`01465000 fffff880`01470000 0x0000b000
nvraid.sys 5/20/2009 1:39:40 0x4a13a5ac fffff880`01067000 fffff880`01090000 0x00029000
nvstor.sys 5/20/2009 1:45:37 0x4a13a711 fffff880`017b8000 fffff880`017e3000 0x0002b000
Accelerometer.sys 7/8/2009 13:41:38 0x4a54e862 fffff880`04860000 fffff880`0486c000 0x0000c000
hpdskflt.sys 7/8/2009 13:41:38 0x4a54e862 fffff880`022fb000 fffff880`02305000 0x0000a000
IntcHdmi.sys 7/10/2009 8:45:10 0x4a5745e6 fffff880`0699b000 fffff880`069c2000 0x00027000
How To Find Drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads