ickymay
New Member
hi again
i formatted my pc because of this: http://windows7forums.com/windows-7-support/36913-email-window-keeps-showing-why.html
and i got my first blue screen
i have now panda internet security 2010
can anyone check my file?
i think it's ntoskrnl.exe
this is still an issue with panda security and you need to remove it and replace with Link Removed due to 404 Error
windows debugger showed
pavjobs.exe is a component of Panda security*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 2d72b, 2, 27caa}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000002d72b, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000027caa, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: pavjobs.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000315d32c to fffff800030cef00
STACK_TEXT:
fffff880`08c812a8 fffff800`0315d32c : 00000000`0000004e 00000000`00000099 00000000`0002d72b 00000000`00000002 : nt!KeBugCheckEx
fffff880`08c812b0 fffff800`0312db82 : fffffa80`0039fd50 00000000`00000001 fffffa80`02002b60 00000000`00000080 : nt!MiBadShareCount+0x4c
fffff880`08c812f0 fffff800`0318e23d : fffffa80`0039fd50 fffff880`08c81440 00000000`00000080 00000000`00097ca2 : nt! ?? ::FNODOBFM::`string'+0x11ae2
fffff880`08c81350 fffff800`030729d5 : fa8005d1`780004c0 fffff880`08c81440 00000000`00000690 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`08c813d0 fffff800`0336e96a : fffffa80`077d1000 fffffa80`00000001 fffffa80`077d1000 00000000`00000005 : nt! ?? ::FNODOBFM::`string'+0x2d968
fffff880`08c81540 fffff800`0311387d : fffffa80`077d1000 00000000`004d4000 00000000`0035e000 00000000`000004d4 : nt!MmPrefetchForCacheManager+0x96
fffff880`08c81590 fffff800`033e95fb : 00000000`004c0000 00000000`004d4cdc fffffa80`041e3f20 00000000`0e1d0020 : nt!CcFetchDataForRead+0x17d
fffff880`08c815f0 fffff880`012bec48 : fffff880`00000000 00000000`00000005 fffffa80`0002b324 fffffa80`0035c901 : nt!CcCopyRead+0x16b
fffff880`08c816b0 fffff880`011060c8 : fffffa80`041e3f20 fffffa80`076cd0d8 fffff6fb`7da00000 fffffa80`041e3f01 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`08c81880 fffff880`01109c2a : fffff880`08c81950 00000000`0e1d0003 00000000`0e1d0000 fffffa80`041e3f00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`08c818e0 fffff880`011275f0 : fffffa80`041e3f20 00000000`00000000 fffff880`08c81b40 00000000`0035c950 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`08c81920 fffff880`011060c8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`041e3f20 : fltmgr!FltpFastIoRead+0x1d0
fffff880`08c819c0 fffff880`011274ef : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03c00430 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`08c81a20 fffff800`033e9f29 : fffffa80`041e3f20 fffff880`00000001 fffffa80`03ce5f30 fffffa80`041e3f20 : fltmgr!FltpFastIoRead+0xcf
fffff880`08c81ac0 fffff800`030ce153 : 00000000`000005d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`08c81bb0 00000000`74992dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0239f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74992dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0315d32c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
If after you have completely cleared out panda Antivirus and Firewall you then get another bluescreen please upload here and we will continue to try and find the cause
these drivers are old and need replacing
COMFiltr.sys is a Panda Anti-Dialer module and I would be surprised they would be using a driver made before windows 7 was even released ?COMFiltr.sys fffff880`05d89000 fffff880`05d91000 0x00008000 0x4667b762 07/06/2007 07:44:34
ShldFlt.sys fffff880`0198e000 fffff880`0199d000 0x0000f000 0x47c6a786 28/02/2008 12:22:30
fnetm64.SYS fffff880`05da9000 fffff880`05db5000 0x0000c000 0x47ebe157 27/03/2008 18:03:03
Prot6Flt.sys fffff880`065cb000 fffff880`065d5000 0x0000a000 0x48749286 09/07/2008 10:27:18
ShldFlt.sys is a Panda File Shield Driver ...........
fnetm64.SYS Panda .............
Prot6Flt.sys It's a Panda too ............
something like I posted here so we are going in a loop on this one currently