New
#11
Yeah ccleaner probably did the trick in deleting those and the software I was talking about is in this guide that you will follow to make your post after you blue screen: https://www.sevenforums.com/crashes-d...tructions.html
Yeah ccleaner probably did the trick in deleting those and the software I was talking about is in this guide that you will follow to make your post after you blue screen: https://www.sevenforums.com/crashes-d...tructions.html
Well it happened again.
No idea what happened this time. I had Utorrent running for the past 48 hours without any issues.I left town and when i can be a few hours later my computer was unresponsive.It was on but was in a sleep mode where my monitor shuts off after 10 minutes of inactivity.I moved my mouse to try to wake the monitor up and it would not do anything at all.So i turned to the computer off with the button on the front then waited a few minutes and turned it back on.When i did i checked the dmp files the same way i did before and it should Utorrent.exe again and tdx.sys
This was the first time its happened since my initial posting.
This time i did run the jcgriff software.
Here is the link to everything.
http://www.megaupload.com/?d=16BHSZ2Y
Hopefully these results can pinpoint the exact issue.
I think i am going to reinstall utorrent as well to see if that helps.
I think I may have a theory here. Are you using K9 Web protection? If so Utorrent and K9 are not a good mix even though you can set K9 to overlook Utorrent. Also while using Utorrent it's not a good idea to put the computer to sleep. When file sharing the computers resources need to be accessible at all times. I think though you main concern is the K9 web protection though. Also please update your network adapter drivers and be sure to limit the amount of connections that are incoming and outgoing from your computer. Depending on your internet speed or bandwidth from your isp you are limited to the amount of connections and also upon the amount of memory your laptop has.
Event log errors that need fixing:Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Administrator\Downloads\icebrg\Windows_NT6_BSOD_jcgriff2\091711-20436-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*F:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17640.x86fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0x83251000 PsLoadedModuleList = 0x8339a4f0 Debug session time: Sat Sep 17 12:33:30.980 2011 (UTC - 6:00) System Uptime: 2 days 18:38:06.712 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ............................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, 8f6afc82, 9a1a7978, 0} *** WARNING: Unable to verify timestamp for bckd.sys *** ERROR: Module load completed but symbols could not be loaded for bckd.sys Probably caused by : tdx.sys ( tdx!TdxCreateControlChannel+70 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 8f6afc82, The address that the exception occurred at Arg3: 9a1a7978, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: tdx!TdxCreateControlChannel+70 8f6afc82 89700c mov dword ptr [eax+0Ch],esi TRAP_FRAME: 9a1a7978 -- (.trap 0xffffffff9a1a7978) ErrCode = 00000002 eax=00000cc0 ebx=00000000 ecx=00000002 edx=00000000 esi=88a20330 edi=00000003 eip=8f6afc82 esp=9a1a79ec ebp=9a1a79f4 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 tdx!TdxCreateControlChannel+0x70: 8f6afc82 89700c mov dword ptr [eax+0Ch],esi ds:0023:00000ccc=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: uTorrent.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 8f6b7009 to 8f6afc82 STACK_TEXT: 9a1a79f4 8f6b7009 86b15008 00000cc0 00000000 tdx!TdxCreateControlChannel+0x70 9a1a7a2c 8328858e 86d17e60 c14bfbb8 00000000 tdx!TdxTdiDispatchCreate+0x5f 9a1a7a44 8f72e292 00000000 c14bfc94 c14bfbb8 nt!IofCallDriver+0x63 WARNING: Stack unwind information not available. Following frames may be wrong. 9a1a7a58 8f72a033 86d180d0 00000000 c14bfbb8 bckd+0x6292 9a1a7a84 8f72f157 00000000 9a1a7aac 8f731837 bckd+0x2033 9a1a7a90 8f731837 86d18018 c14bfbb8 86d180d0 bckd+0x7157 9a1a7aac 8f73193e 00d180d0 9714b8f4 00000000 bckd+0x9837 9a1a7ac8 8f73288e 86d180d0 9714b8f4 8a677384 bckd+0x993e 9a1a7ae4 8f733336 86d180d0 8a6772f0 8a677384 bckd+0xa88e 9a1a7b04 8328858e 86d18018 8a6772f0 8a6772f0 bckd+0xb336 9a1a7b1c 8f6f3642 00021c10 869dbbc0 88bcb898 nt!IofCallDriver+0x63 9a1a7b70 8f6f0dd0 869dbbc0 00000000 dbab96e8 afd!AfdBeginDisconnect+0x2cb 9a1a7be0 8f6f12b5 dbab96e8 86cf6850 9a1a7c08 afd!AfdCleanupCore+0x346 9a1a7bf0 8328858e 86cf6850 dbab96e8 e4661d30 afd!AfdDispatch+0x125 9a1a7c08 83483aa6 8597e508 e4661d18 00000001 nt!IofCallDriver+0x63 9a1a7c48 83474f47 85aaf030 e4661d30 00000001 nt!IopCloseFile+0x2f3 9a1a7c94 83496394 85aaf030 c28aea28 85c74578 nt!ObpDecrementHandleCount+0x139 9a1a7cdc 834960d4 c28aea28 b90d0958 85aaf030 nt!ObpCloseHandleTableEntry+0x203 9a1a7d0c 8349646e 85aaf030 85c74501 02bbfd24 nt!ObpCloseHandle+0x7f 9a1a7d28 8328f1fa 000004ac 02bbfd80 77d670b4 nt!NtClose+0x4e 9a1a7d28 77d670b4 000004ac 02bbfd80 77d670b4 nt!KiFastCallEntry+0x12a 02bbfd80 00000000 00000000 00000000 00000000 0x77d670b4 STACK_COMMAND: kb FOLLOWUP_IP: tdx!TdxCreateControlChannel+70 8f6afc82 89700c mov dword ptr [eax+0Ch],esi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: tdx!TdxCreateControlChannel+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: tdx IMAGE_NAME: tdx.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78935 FAILURE_BUCKET_ID: 0x8E_tdx!TdxCreateControlChannel+70 BUCKET_ID: 0x8E_tdx!TdxCreateControlChannel+70 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 8f6afc82, The address that the exception occurred at Arg3: 9a1a7978, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: tdx!TdxCreateControlChannel+70 8f6afc82 89700c mov dword ptr [eax+0Ch],esi TRAP_FRAME: 9a1a7978 -- (.trap 0xffffffff9a1a7978) ErrCode = 00000002 eax=00000cc0 ebx=00000000 ecx=00000002 edx=00000000 esi=88a20330 edi=00000003 eip=8f6afc82 esp=9a1a79ec ebp=9a1a79f4 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 tdx!TdxCreateControlChannel+0x70: 8f6afc82 89700c mov dword ptr [eax+0Ch],esi ds:0023:00000ccc=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: uTorrent.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 8f6b7009 to 8f6afc82 STACK_TEXT: 9a1a79f4 8f6b7009 86b15008 00000cc0 00000000 tdx!TdxCreateControlChannel+0x70 9a1a7a2c 8328858e 86d17e60 c14bfbb8 00000000 tdx!TdxTdiDispatchCreate+0x5f 9a1a7a44 8f72e292 00000000 c14bfc94 c14bfbb8 nt!IofCallDriver+0x63 WARNING: Stack unwind information not available. Following frames may be wrong. 9a1a7a58 8f72a033 86d180d0 00000000 c14bfbb8 bckd+0x6292 9a1a7a84 8f72f157 00000000 9a1a7aac 8f731837 bckd+0x2033 9a1a7a90 8f731837 86d18018 c14bfbb8 86d180d0 bckd+0x7157 9a1a7aac 8f73193e 00d180d0 9714b8f4 00000000 bckd+0x9837 9a1a7ac8 8f73288e 86d180d0 9714b8f4 8a677384 bckd+0x993e 9a1a7ae4 8f733336 86d180d0 8a6772f0 8a677384 bckd+0xa88e 9a1a7b04 8328858e 86d18018 8a6772f0 8a6772f0 bckd+0xb336 9a1a7b1c 8f6f3642 00021c10 869dbbc0 88bcb898 nt!IofCallDriver+0x63 9a1a7b70 8f6f0dd0 869dbbc0 00000000 dbab96e8 afd!AfdBeginDisconnect+0x2cb 9a1a7be0 8f6f12b5 dbab96e8 86cf6850 9a1a7c08 afd!AfdCleanupCore+0x346 9a1a7bf0 8328858e 86cf6850 dbab96e8 e4661d30 afd!AfdDispatch+0x125 9a1a7c08 83483aa6 8597e508 e4661d18 00000001 nt!IofCallDriver+0x63 9a1a7c48 83474f47 85aaf030 e4661d30 00000001 nt!IopCloseFile+0x2f3 9a1a7c94 83496394 85aaf030 c28aea28 85c74578 nt!ObpDecrementHandleCount+0x139 9a1a7cdc 834960d4 c28aea28 b90d0958 85aaf030 nt!ObpCloseHandleTableEntry+0x203 9a1a7d0c 8349646e 85aaf030 85c74501 02bbfd24 nt!ObpCloseHandle+0x7f 9a1a7d28 8328f1fa 000004ac 02bbfd80 77d670b4 nt!NtClose+0x4e 9a1a7d28 77d670b4 000004ac 02bbfd80 77d670b4 nt!KiFastCallEntry+0x12a 02bbfd80 00000000 00000000 00000000 00000000 0x77d670b4 STACK_COMMAND: kb FOLLOWUP_IP: tdx!TdxCreateControlChannel+70 8f6afc82 89700c mov dword ptr [eax+0Ch],esi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: tdx!TdxCreateControlChannel+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: tdx IMAGE_NAME: tdx.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78935 FAILURE_BUCKET_ID: 0x8E_tdx!TdxCreateControlChannel+70 BUCKET_ID: 0x8E_tdx!TdxCreateControlChannel+70 Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 8be35000 8be7d000 ACPI ACPI.sys Sat Nov 20 01:37:52 2010 (4CE788E0) 8f6ce000 8f728000 afd afd.sys Sun Apr 24 20:18:00 2011 (4DB4D9D8) 929c3000 929d5000 AgileVpn AgileVpn.sys Mon Jul 13 17:55:00 2009 (4A5BC954) 8bf86000 8bf8f000 amdxata amdxata.sys Fri Mar 19 10:19:01 2010 (4BA3A3F5) 92994000 929afc00 AnyDVD AnyDVD.sys Thu Jul 28 04:27:06 2011 (4E31397A) 9e292000 9e295e40 Aspi32 Aspi32.SYS Fri Sep 10 17:46:10 1999 (37D99842) b4ce8000 b4cf1000 asyncmac asyncmac.sys Mon Jul 13 17:54:46 2009 (4A5BC946) 8bf5a000 8bf63000 atapi atapi.sys Mon Jul 13 17:11:15 2009 (4A5BBF13) 8bf63000 8bf86000 ataport ataport.SYS Sat Nov 20 01:38:00 2010 (4CE788E8) 9b510000 9b55d000 ATMFD ATMFD.DLL Fri Feb 18 21:34:53 2011 (4D5F486D) 8f728000 8f73b100 bckd bckd.sys Fri Jun 10 15:40:03 2011 (4DF28F33) 8c000000 8c007000 Beep Beep.SYS Mon Jul 13 17:45:00 2009 (4A5BC6FC) 9288c000 9289a000 blbdrive blbdrive.sys Mon Jul 13 17:23:04 2009 (4A5BC1D8) 8bc99000 8bca1000 BOOTVID BOOTVID.dll Mon Jul 13 19:04:34 2009 (4A5BD9A2) 82fbb000 82fd4000 bowser bowser.sys Tue Feb 22 21:47:32 2011 (4D649164) 9b4f0000 9b50e000 cdd cdd.dll Sat Nov 20 04:56:35 2010 (4CE7B773) 8be00000 8be1f000 cdrom cdrom.sys Sat Nov 20 01:38:09 2010 (4CE788F1) 8bce3000 8bd8e000 CI CI.dll Sat Nov 20 05:05:17 2010 (4CE7B97D) 8bfd4000 8bff9000 CLASSPNP CLASSPNP.SYS Mon Jul 13 17:11:20 2009 (4A5BBF18) 8bca1000 8bce3000 CLFS CLFS.SYS Mon Jul 13 17:11:10 2009 (4A5BBF0E) 8c176000 8c1d3000 cng cng.sys Mon Jul 13 17:32:55 2009 (4A5BC427) 929b6000 929c3000 CompositeBus CompositeBus.sys Sat Nov 20 02:50:21 2010 (4CE799DD) 93538000 93545000 crashdmp crashdmp.sys Mon Jul 13 17:45:50 2009 (4A5BC72E) 92874000 9288c000 dfsc dfsc.sys Sat Nov 20 01:42:32 2010 (4CE789F8) 92868000 92874000 discache discache.sys Mon Jul 13 17:24:04 2009 (4A5BC214) 8c400000 8c411000 disk disk.sys Mon Jul 13 17:11:28 2009 (4A5BBF20) 9351f000 93538000 drmk drmk.sys Mon Jul 13 18:36:05 2009 (4A5BD2F5) 93550000 93559000 dump_atapi dump_atapi.sys Mon Jul 13 17:11:15 2009 (4A5BBF13) 93545000 93550000 dump_dumpata dump_dumpata.sys Mon Jul 13 17:11:16 2009 (4A5BBF14) 93559000 9356a000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 17:12:47 2009 (4A5BBF6F) 9356a000 93574000 Dxapi Dxapi.sys Mon Jul 13 17:25:25 2009 (4A5BC265) 92f3b000 92ff2000 dxgkrnl dxgkrnl.sys Sat Nov 20 02:08:14 2010 (4CE78FFE) 928cd000 92906000 dxgmms1 dxgmms1.sys Wed Feb 02 20:45:05 2011 (4D4A24C1) 92906000 9293e000 e1e6032 e1e6032.sys Tue Mar 24 12:16:11 2009 (49C9236B) 82e33000 82eef000 eamon eamon.sys Fri Feb 06 06:14:21 2009 (498C37AD) 8f624000 8f640000 ehdrv ehdrv.sys Fri Feb 06 06:15:01 2009 (498C37D5) 9285e000 92868000 ElbyCDIO ElbyCDIO.sys Thu Dec 16 15:57:56 2010 (4D0A9974) 9e296000 9e2af000 epfwwfpr epfwwfpr.sys Fri Feb 06 06:06:19 2009 (498C35CB) b4cbe000 b4ce8000 fastfat fastfat.SYS Mon Jul 13 17:14:01 2009 (4A5BBFB9) 92989000 92994000 fdc fdc.sys Mon Jul 13 17:45:45 2009 (4A5BC729) 8bfc3000 8bfd4000 fileinfo fileinfo.sys Mon Jul 13 17:21:51 2009 (4A5BC18F) 8bf8f000 8bfc3000 fltmgr fltmgr.sys Mon Jul 13 17:11:13 2009 (4A5BBF11) 8c1e1000 8c1ea000 Fs_Rec Fs_Rec.sys Mon Jul 13 17:11:14 2009 (4A5BBF12) 8c200000 8c232000 fvevol fvevol.sys Sat Nov 20 01:40:22 2010 (4CE78976) 8c570000 8c5a1000 fwpkclnt fwpkclnt.sys Sat Nov 20 01:39:08 2010 (4CE7892C) 929b0000 929b5280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 06:16:53 2009 (4A1151B5) 8321a000 83251000 hal halmacpi.dll Sat Nov 20 01:37:38 2010 (4CE788D2) 92a0f000 92a2e000 HDAudBus HDAudBus.sys Sat Nov 20 02:59:28 2010 (4CE79C00) b4d42000 b4d55000 HIDCLASS HIDCLASS.SYS Sat Nov 20 02:59:37 2010 (4CE79C09) 935b4000 935ba480 HIDPARSE HIDPARSE.SYS Mon Jul 13 17:50:59 2009 (4A5BC863) b4d37000 b4d42000 hidusb hidusb.sys Sat Nov 20 02:59:38 2010 (4CE79C0A) 82f36000 82fbb000 HTTP HTTP.sys Sat Nov 20 01:40:17 2010 (4CE78971) 8c5f8000 8c600000 hwpolicy hwpolicy.sys Sat Nov 20 01:37:35 2010 (4CE788CF) 92a32000 92f3b000 igdkmd32 igdkmd32.sys Wed Sep 23 13:18:09 2009 (4ABA7471) 9e2af000 9e2b0400 inpout32 inpout32.sys Fri Oct 17 17:02:20 2008 (48F9197C) 928bb000 928cd000 intelppm intelppm.sys Mon Jul 13 17:11:03 2009 (4A5BBF07) 9343d000 9344a000 kbdclass kbdclass.sys Mon Jul 13 17:11:15 2009 (4A5BBF13) b4d55000 b4d61000 kbdhid kbdhid.sys Sat Nov 20 02:50:10 2010 (4CE799D2) 80bbb000 80bc3000 kdcom kdcom.dll Mon Jul 13 19:08:58 2009 (4A5BDAAA) 93459000 9348d000 ks ks.sys Sat Nov 20 02:50:17 2010 (4CE799D9) 8c163000 8c176000 ksecdd ksecdd.sys Sat Nov 20 01:38:54 2010 (4CE7891E) 8c329000 8c34e000 ksecpkg ksecpkg.sys Mon Jul 13 17:34:00 2009 (4A5BC468) 82f13000 82f23000 lltdio lltdio.sys Mon Jul 13 17:53:18 2009 (4A5BC8EE) 935d2000 935ed000 luafv luafv.sys Mon Jul 13 17:15:44 2009 (4A5BC020) b4cf1000 b4cf4780 mbam mbam.sys Mon Jan 03 13:49:52 2011 (4D223670) 8bc03000 8bc88000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 05:00:54 2010 (4CE7B876) 9358b000 93596000 monitor monitor.sys Mon Jul 13 17:25:58 2009 (4A5BC286) 9344a000 93457000 mouclass mouclass.sys Mon Jul 13 17:11:15 2009 (4A5BBF13) b4d61000 b4d6c000 mouhid mouhid.sys Mon Jul 13 17:45:08 2009 (4A5BC704) 8bf44000 8bf5a000 mountmgr mountmgr.sys Sat Nov 20 01:38:09 2010 (4CE788F1) 82fd4000 82fe6000 mpsdrv mpsdrv.sys Mon Jul 13 17:52:52 2009 (4A5BC8D4) 82e00000 82e23000 mrxsmb mrxsmb.sys Tue Apr 26 20:17:20 2011 (4DB77CB0) 9e224000 9e25f000 mrxsmb10 mrxsmb10.sys Fri Jul 08 20:29:57 2011 (4E17BD25) 9e25f000 9e27a000 mrxsmb20 mrxsmb20.sys Tue Apr 26 20:17:26 2011 (4DB77CB6) 8f692000 8f69d000 Msfs Msfs.SYS Mon Jul 13 17:11:26 2009 (4A5BBF1E) 8be86000 8be8e000 msisadrv msisadrv.sys Mon Jul 13 17:11:09 2009 (4A5BBF0D) 8c138000 8c163000 msrpc msrpc.sys Mon Jul 13 17:11:59 2009 (4A5BBF3F) 92854000 9285e000 mssmbios mssmbios.sys Mon Jul 13 17:19:25 2009 (4A5BC0FD) 8c5e8000 8c5f8000 mup mup.sys Mon Jul 13 17:14:14 2009 (4A5BBFC6) 8c234000 8c2eb000 ndis ndis.sys Sat Nov 20 01:39:19 2010 (4CE78937) 929ed000 929f8000 ndistapi ndistapi.sys Mon Jul 13 17:54:24 2009 (4A5BC930) 8f7cc000 8f7ee000 ndiswan ndiswan.sys Sat Nov 20 03:07:48 2010 (4CE79DF4) 934df000 934f0000 NDProxy NDProxy.SYS Sat Nov 20 03:07:39 2010 (4CE79DEB) 8f794000 8f7a2000 netbios netbios.sys Mon Jul 13 17:53:54 2009 (4A5BC912) 8f73c000 8f76e000 netbt netbt.sys Sat Nov 20 01:39:22 2010 (4CE7893A) 8c2eb000 8c329000 NETIO NETIO.SYS Sat Nov 20 01:40:03 2010 (4CE78963) 8f69d000 8f6ab000 Npfs Npfs.SYS Mon Jul 13 17:11:31 2009 (4A5BBF23) 9284a000 92854000 nsiproxy nsiproxy.sys Mon Jul 13 17:12:08 2009 (4A5BBF48) 83251000 83663000 nt ntkrpamp.exe Wed Jun 22 20:23:05 2011 (4E02A389) 8c009000 8c138000 Ntfs Ntfs.sys Thu Mar 10 20:21:11 2011 (4D799527) 8c41e000 8c425000 Null Null.SYS Mon Jul 13 17:11:12 2009 (4A5BBF10) 8f775000 8f794000 pacer pacer.sys Mon Jul 13 17:53:58 2009 (4A5BC916) 8bec3000 8bed4000 partmgr partmgr.sys Sat Nov 20 01:38:14 2010 (4CE788F6) 8be8e000 8beb8000 pci pci.sys Sat Nov 20 01:37:57 2010 (4CE788E5) 8bf2f000 8bf36000 pciide pciide.sys Mon Jul 13 17:11:19 2009 (4A5BBF17) 8bf36000 8bf44000 PCIIDEX PCIIDEX.SYS Mon Jul 13 17:11:15 2009 (4A5BBF13) 93431000 9343c900 pcouffin pcouffin.sys Tue Dec 05 07:39:53 2006 (457584B9) 8c1d3000 8c1e1000 pcw pcw.sys Mon Jul 13 17:11:10 2009 (4A5BBF0E) 9e2b1000 9e348000 peauth peauth.sys Mon Jul 13 18:35:44 2009 (4A5BD2E0) 934f0000 9351f000 portcls portcls.sys Mon Jul 13 17:51:00 2009 (4A5BC864) 8bc88000 8bc99000 PSHED PSHED.dll Mon Jul 13 19:09:36 2009 (4A5BDAD0) 929d5000 929ed000 rasl2tp rasl2tp.sys Mon Jul 13 17:54:33 2009 (4A5BC939) 8f600000 8f618000 raspppoe raspppoe.sys Mon Jul 13 17:54:53 2009 (4A5BC94D) 93403000 9341a000 raspptp raspptp.sys Mon Jul 13 17:54:47 2009 (4A5BC947) 9341a000 93431000 rassstp rassstp.sys Mon Jul 13 17:54:57 2009 (4A5BC951) 92809000 9284a000 rdbss rdbss.sys Sat Nov 20 01:42:44 2010 (4CE78A04) 8f67a000 8f682000 RDPCDD RDPCDD.sys Sat Nov 20 03:22:19 2010 (4CE7A15B) 8f682000 8f68a000 rdpencdd rdpencdd.sys Mon Jul 13 18:01:39 2009 (4A5BCAE3) 8f68a000 8f692000 rdprefmp rdprefmp.sys Mon Jul 13 18:01:41 2009 (4A5BCAE5) 9e3b3000 9e3e5000 RDPWD RDPWD.SYS Sat Nov 20 03:22:23 2010 (4CE7A15F) 8c3b9000 8c3e6000 rdyboost rdyboost.sys Sat Nov 20 02:00:07 2010 (4CE78E17) 82f23000 82f36000 rspndr rspndr.sys Mon Jul 13 17:53:20 2009 (4A5BC8F0) 93805000 939f95c0 RTKVHDA RTKVHDA.sys Thu Jan 24 04:06:17 2008 (47987129) 9e348000 9e34b060 SBKUPNT SBKUPNT.SYS Fri Jul 13 06:56:13 2001 (3B4EEFED) 9e34c000 9e356000 secdrv secdrv.SYS Wed Sep 13 07:18:32 2006 (45080528) 8c5e0000 8c5e8000 spldr spldr.sys Mon May 11 10:13:47 2009 (4A084EBB) b4c6c000 b4cbe000 srv srv.sys Thu Apr 28 20:46:30 2011 (4DBA2686) b4c1c000 b4c6c000 srv2 srv2.sys Thu Apr 28 20:46:13 2011 (4DBA2675) 9e356000 9e377000 srvnet srvnet.sys Thu Apr 28 20:46:08 2011 (4DBA2670) 8f7a2000 8f7a8000 StarOpen StarOpen.SYS Tue Jun 27 13:15:56 2006 (44A183EC) 93457000 93458380 swenum swenum.sys Mon Jul 13 17:45:08 2009 (4A5BC704) 8c426000 8c570000 tcpip tcpip.sys Mon Jun 20 21:16:03 2011 (4E000CF3) 9e377000 9e384000 tcpipreg tcpipreg.sys Sat Nov 20 03:07:13 2010 (4CE79DD1) 8f6c2000 8f6ce000 TDI TDI.SYS Sat Nov 20 01:39:18 2010 (4CE78936) 9e39b000 9e3a6000 tdtcp tdtcp.sys Sat Nov 20 03:21:10 2010 (4CE7A116) 8f6ab000 8f6c2000 tdx tdx.sys Sat Nov 20 01:39:17 2010 (4CE78935) 8f7bb000 8f7cc000 termdd termdd.sys Sat Nov 20 03:21:10 2010 (4CE7A116) 82eef000 82ef8340 tifsfilt tifsfilt.sys Wed Aug 29 06:37:17 2007 (46D5687D) 8c34e000 8c3b8380 timntr timntr.sys Wed Aug 29 06:13:12 2007 (46D562D8) 9b4c0000 9b4c9000 TSDDD TSDDD.dll unavailable (00000000) 9e3a6000 9e3b3000 tssecsrv tssecsrv.sys Sat Nov 20 03:22:20 2010 (4CE7A15C) 9289a000 928bb000 tunnel tunnel.sys Sat Nov 20 03:06:40 2010 (4CE79DB0) 9348d000 9349b000 umbus umbus.sys Sat Nov 20 03:00:23 2010 (4CE79C37) b4d6c000 b4d83000 usbccgp usbccgp.sys Thu Mar 24 20:58:06 2011 (4D8C04BE) 939fa000 939fb700 USBD USBD.SYS Thu Mar 24 20:57:53 2011 (4D8C04B1) 92a00000 92a0f000 usbehci usbehci.sys Thu Mar 24 20:57:58 2011 (4D8C04B6) 9349b000 934df000 usbhub usbhub.sys Thu Mar 24 20:58:34 2011 (4D8C04DA) 9293e000 92989000 USBPORT USBPORT.SYS Thu Mar 24 20:58:05 2011 (4D8C04BD) 93574000 9358b000 USBSTOR USBSTOR.SYS Thu Mar 10 21:01:12 2011 (4D799E88) 92ff2000 92ffd000 usbuhci usbuhci.sys Thu Mar 24 20:57:56 2011 (4D8C04B4) 8beb8000 8bec3000 vdrvroot vdrvroot.sys Mon Jul 13 17:46:19 2009 (4A5BC74B) 8f640000 8f64c000 vga vga.sys Mon Jul 13 17:25:50 2009 (4A5BC27E) 8f64c000 8f66d000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 17:25:49 2009 (4A5BC27D) 8bed4000 8bee4000 volmgr volmgr.sys Sat Nov 20 01:38:06 2010 (4CE788EE) 8bee4000 8bf2f000 volmgrx volmgrx.sys Mon Jul 13 17:11:41 2009 (4A5BBF2D) 8c5a1000 8c5e0000 volsnap volsnap.sys Sat Nov 20 01:38:13 2010 (4CE788F5) 8f7a8000 8f7bb000 wanarp wanarp.sys Sat Nov 20 03:07:45 2010 (4CE79DF1) 8f66d000 8f67a000 watchdog watchdog.sys Mon Jul 13 17:24:10 2009 (4A5BC21A) 8bd8e000 8bdff000 Wdf01000 Wdf01000.sys Mon Jul 13 17:11:36 2009 (4A5BBF28) 8be27000 8be35000 WDFLDR WDFLDR.SYS Mon Jul 13 17:11:25 2009 (4A5BBF1D) 8f76e000 8f775000 wfplwf wfplwf.sys Mon Jul 13 17:53:51 2009 (4A5BC90F) 9b260000 9b4ae000 win32k win32k.sys Fri Jun 10 20:29:02 2011 (4DF2D2EE) 8be7d000 8be86000 WMILIB WMILIB.SYS Mon Jul 13 17:11:22 2009 (4A5BBF1A) 82ef9000 82f13000 WudfPf WudfPf.sys Sat Nov 20 02:58:55 2010 (4CE79BDF) b4d16000 b4d36480 WUDFRd WUDFRd.sys Sat Nov 20 02:59:19 2010 (4CE79BF7)
Please download the authroot.zip that is attached to the bottom of this post and unzip it then right click on the authroot.ctl and click install ctl and import the certificate to fix the above error please.Code:Event[2]: Log Name: Application Source: Microsoft-Windows-CAPI2 Date: 2011-09-17T16:44:48.882 Event ID: 4107 Task: N/A Level: Error Opcode: Info Keyword: Classic User: N/A User Name: N/A Computer: matt-PC Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
Go to start and type "index" in search bar and hit return then click the advanced button and click rebuild index to fix the above error please.Code:Event[90]: Log Name: Application Source: Microsoft-Windows-Search Date: 2011-09-17T16:35:47.000 Event ID: 9002 Task: Search service Level: Error Opcode: N/A Keyword: Classic User: N/A User Name: N/A Computer: matt-PC Description: The Windows Search Service cannot load the property store information. Context: Windows Application, SystemIndex Catalog Details: The content index database is corrupt. (HRESULT : 0xc0041800) (0xc0041800)
Download the latest Redistributables from microsoft: http://download.microsoft.com/downlo...redist_x86.exeCode:Event[115]: Log Name: Application Source: SideBySide Date: 2011-09-17T00:32:56.000 Event ID: 63 Task: N/A Level: Error Opcode: N/A Keyword: Classic User: N/A User Name: N/A Computer: matt-PC Description: Activation context generation failed for "c:\program files\spybot - search & destroy\DelZip179.dll".Error in manifest or policy file "c:\program files\spybot - search & destroy\DelZip179.dll" on line 8. The value "*" of attribute "language" in element "assemblyIdentity" is invalid.
Thats for x86 should hopefully get rid of the sidebyside errors.
FlashPlayer should be reinstalled
Spyware Doctor is causing some issues should be reinstalled
You have a lot of apps crashing in the event viewer logs please download Malwarebytes: Malwarebytes : Free anti-malware, anti-virus and spyware removal download and run a full update followed by a full scan of your system.
Please report back to us the results of the malwarescan and the other fixes we suggested..
Thanks
Seth
I installed everything you suggested and i am running Malwarebytes right now.
I ran malwarebytes after the BSOD happened the first few times and it did not find anything.
Also i uninstalled spyware doctor awhile ago so i have no idea why that's showing up in the logs somewhere.
EDIT: Will post back once malwarebytes is done running.
Forgot to include this in my last edit
The computer itself is not set to go to sleep at all only the monitor is.
I have since turned it off as well though.
Going to run a full scan with malwarebytes before i go to bed that way it can run overnight while no one is on the computer.Will post back tomorrow with the results of it.
Well i ran a full scan of malwarebytes overnight. It found nothing.
The BSOD happened again overnight sometime and i woke up to a BSOD again.
Utorrent was running overnight as well.So that could be the cause again idk for sure.
Going to uninstall K-9 now as well and then fire up Utorrent and let it run and see if it happens again.
I ran the jcgriff software once again and below is the link to the files for that run.
http://www.megaupload.com/?d=C4936LD5
Hi icebrg
The latest dump is pointing to the K9 software again so I would uninstall it like you said and I'm pretty sure your problem should go away. If it doesn't upload the latest crash dump again. I don't think you will have anymore issues though after K9 is gone keeping fingers crossed. If it does crash again while running utorent try an older version of it (utorrent)
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 0000002c, The address that the exception occurred at Arg3: b4affa20, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +12a 0000002c ?? ??? TRAP_FRAME: b4affa20 -- (.trap 0xffffffffb4affa20) ErrCode = 00000010 eax=86f19018 ebx=eaff4320 ecx=000000ae edx=86ab9cc0 esi=86f190d0 edi=b5ef0b6c eip=0000002c esp=b4affa94 ebp=b4affaac iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246 0000002c ?? ??? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: uTorrent.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 92b66837 to 0000002c STACK_TEXT: WARNING: Frame IP not in any known module. Following frames may be wrong. b4affa90 92b66837 86f19018 eaff4320 86f190d0 0x2c b4affaac 92b6693e aef190d0 b5ef0b6c 00000000 bckd+0x9837 b4affac8 92b6788e 86f190d0 b5ef0b6c 887a47bc bckd+0x993e b4affae4 92b68336 86f190d0 887a4728 887a47bc bckd+0xa88e b4affb04 8328b58e 86f19018 887a4728 887a4728 bckd+0xb336 b4affb1c 92b28642 00021c10 c3436780 866d4098 nt!IofCallDriver+0x63 b4affb70 92b25dd0 c3436780 00000000 8896e590 afd!AfdBeginDisconnect+0x2cb b4affbe0 92b262b5 8896e590 86b04710 b4affc08 afd!AfdCleanupCore+0x346 b4affbf0 8328b58e 86b04710 8896e590 d6e2c130 afd!AfdDispatch+0x125 b4affc08 83486aa6 85998508 d6e2c118 00000001 nt!IofCallDriver+0x63 b4affc48 83477f47 87813200 d6e2c130 00000001 nt!IopCloseFile+0x2f3 b4affc94 83499394 87813200 b4dc32a0 87361030 nt!ObpDecrementHandleCount+0x139 b4affcdc 834990d4 b4dc32a0 8ce14f88 87813200 nt!ObpCloseHandleTableEntry+0x203 b4affd0c 8349946e 87813200 87361001 02d3fd24 nt!ObpCloseHandle+0x7f b4affd28 832921fa 000007c4 02d3fd80 77a670b4 nt!NtClose+0x4e b4affd28 77a670b4 000007c4 02d3fd80 77a670b4 nt!KiFastCallEntry+0x12a 02d3fd80 00000000 00000000 00000000 00000000 0x77a670b4 STACK_COMMAND: kb FOLLOWUP_IP: bckd+9837 92b66837 ?? ??? SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: bckd+9837 FOLLOWUP_NAME: MachineOwner MODULE_NAME: bckd IMAGE_NAME: bckd.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4df28f33 FAILURE_BUCKET_ID: 0x8E_bckd+9837 BUCKET_ID: 0x8E_bckd+9837 Followup: MachineOwner ---------
K-9 has been uninstalled now and i have been running Utorrent in the background for 12 hours now without any issues.
I'm going to let Utorrent run for days to see if anything happens.
Also since you looked at my last dump report did all the previous issues get fixed? I mean all the fixes you told me to run.
Do they still show errors in the logs or are they gone now since running the fixes you recommended.
Been running Utorrent for 24/7 for the past 5 days now since uninstalling the K9 software and i haven't had a single issue happen.
Thanks again for all your help. :)