Windows 7 BSOD at least twice when I use PC

Bubilog

New Member
Hello this is my first post here and hopefully you can help me

It happens randomly or while Im playing a Game

I reinstalled win7 again as clean install and i still have this problem :(


I've attached the dump and some other info

Thanks in advance~ :D
 

Attachments

  • Seven Forums.rar
    54.9 KB · Views: 185
Welcome to windows7forums.





Update:

ISODrive.sys Tue Feb 10 04:22:07 2009


Disable in divice manager:

VSTBS23.SYS Wed Oct 15 20:30:15 2008
Conexant Soft Modem


Code:
9a6bb804 82aafeeb badb0d00 00000000 00010022 nt!KiTrap0E+0x2cf
9a6bb89c 82ab00af 00000002 807c4120 84cf07e8 nt!ExpCheckForIoPriorityBoost+0x46
9a6bb8e4 82a7b6ce 85c29110 89987008 00000000 nt!ExpWaitForResource+0x7b
9a6bb934 88af43be 84cf07e8 00000001 12c333b9 nt!ExAcquireResourceExclusiveLite+0x1cf
9a6bb984 88ad996a 84a87860 00000000 89987008 Ntfs!TxfCheckForLockConflict+0xb8
9a6bb9d8 88ae3e7d 84a87860 851cc720 89987310 Ntfs!NtfsCheckExistingFile+0x368
9a6bba0c 88adad6e 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingAttr+0x3b
9a6bbaf4 88adb677 84a87860 85100900 89987310 Ntfs!NtfsOpenAttributeInExistingFile+0x308
9a6bbba0 88adaa2d 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingPrefixFcb+0x26e
9a6bbc00 88adcc5c 84a87860 85100900 89986d08 Ntfs!NtfsFindStartingNode+0xb88
9a6bbcdc 88a63210 84a87860 85100900 9a62b944 Ntfs!NtfsCommonCreate+0x65f
9a6bbd1c 82a8111e 9a62b8dc 00000000 ffffffff Ntfs!NtfsCommonCreateCallout+0x20
9a6bbd1c 82a81215 9a62b8dc 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
9a62b840 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31


Check your ntfs for errors:

Disk Check - Windows 7 Forums


Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\113010-31278-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82813000 PsLoadedModuleList = 0x8295b810
Debug session time: Mon Nov 29 13:44:23.784 2010 (UTC - 5:00)
System Uptime: 0 days 0:49:56.719
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 84fcf00f, 988bfb1c, 0}

Probably caused by : fltmgr.sys ( fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 84fcf00f, The address that the exception occurred at
Arg3: 988bfb1c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
+12a
84fcf00f 000404          add     byte ptr [esp+eax],al

TRAP_FRAME:  988bfb1c -- (.trap 0xffffffff988bfb1c)
ErrCode = 00000002
eax=85565240 ebx=861f8020 ecx=00000000 edx=fffffff4 esi=8284f4bc edi=00000000
eip=84fcf00f esp=988bfb90 ebp=84fcf008 iopl=0         ov up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010a82
84fcf00f 000404          add     byte ptr [esp+eax],al      ss:0010:1de24dd0=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82fb420c to 84fcf00f

STACK_TEXT:  
WARNING: Frame IP not in any known module. Following frames may be wrong.
988bfb94 82fb420c 861fced8 84fcf008 00000000 0x84fcf00f
988bfbb8 82fb43cb 988bfbd8 861fced8 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
988bfbf0 8284f4bc 861fced8 84fcf008 84cfcf80 fltmgr!FltpDispatch+0xc5
988bfc08 82a6eea2 848bcac8 84cfcf68 00000001 nt!IofCallDriver+0x63
988bfc48 82a35c0a 86e5f330 84cfcf80 00000001 nt!IopCloseFile+0x2f3
988bfc94 82a58772 86e5f330 9d69d948 85362340 nt!ObpDecrementHandleCount+0x139
988bfcdc 82a59f72 9d69d948 9d7129c8 86e5f330 nt!ObpCloseHandleTableEntry+0x203
988bfd0c 82a5a0ea 86e5f330 85362301 0182f2bc nt!ObpCloseHandle+0x7f
988bfd28 8285642a 000004e4 0182f2c0 771264f4 nt!NtClose+0x4e
988bfd28 771264f4 000004e4 0182f2c0 771264f4 nt!KiFastCallEntry+0x12a
0182f2c0 00000000 00000000 00000000 00000000 0x771264f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa
82fb420c 89450c          mov     dword ptr [ebp+0Ch],eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: fltmgr

IMAGE_NAME:  fltmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf11

FAILURE_BUCKET_ID:  0x8E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa

BUCKET_ID:  0x8E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+2aa

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\120110-24289-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a11000 PsLoadedModuleList = 0x82b59810
Debug session time: Wed Dec  1 08:30:01.430 2010 (UTC - 5:00)
System Uptime: 0 days 0:16:13.240
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {380, 2, 0, 82aafeeb}

Probably caused by : ntkrpamp.exe ( nt!ExpCheckForIoPriorityBoost+46 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000380, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82aafeeb, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82b79718
Unable to read MiSystemVaType memory at 82b59160
 00000380 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!ExpCheckForIoPriorityBoost+46
82aafeeb 8b8680020000    mov     eax,dword ptr [esi+280h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  9a6bb804 -- (.trap 0xffffffff9a6bb804)
ErrCode = 00000000
eax=00000100 ebx=82e24800 ecx=84cf0800 edx=00000000 esi=00000100 edi=84cf07e8
eip=82aafeeb esp=9a6bb878 ebp=9a6bb89c iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ExpCheckForIoPriorityBoost+0x46:
82aafeeb 8b8680020000    mov     eax,dword ptr [esi+280h] ds:0023:00000380=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82aafeeb to 82a5782b

STACK_TEXT:  
9a6bb804 82aafeeb badb0d00 00000000 00010022 nt!KiTrap0E+0x2cf
9a6bb89c 82ab00af 00000002 807c4120 84cf07e8 nt!ExpCheckForIoPriorityBoost+0x46
9a6bb8e4 82a7b6ce 85c29110 89987008 00000000 nt!ExpWaitForResource+0x7b
9a6bb934 88af43be 84cf07e8 00000001 12c333b9 nt!ExAcquireResourceExclusiveLite+0x1cf
9a6bb984 88ad996a 84a87860 00000000 89987008 Ntfs!TxfCheckForLockConflict+0xb8
9a6bb9d8 88ae3e7d 84a87860 851cc720 89987310 Ntfs!NtfsCheckExistingFile+0x368
9a6bba0c 88adad6e 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingAttr+0x3b
9a6bbaf4 88adb677 84a87860 85100900 89987310 Ntfs!NtfsOpenAttributeInExistingFile+0x308
9a6bbba0 88adaa2d 84a87860 85100900 89987310 Ntfs!NtfsOpenExistingPrefixFcb+0x26e
9a6bbc00 88adcc5c 84a87860 85100900 89986d08 Ntfs!NtfsFindStartingNode+0xb88
9a6bbcdc 88a63210 84a87860 85100900 9a62b944 Ntfs!NtfsCommonCreate+0x65f
9a6bbd1c 82a8111e 9a62b8dc 00000000 ffffffff Ntfs!NtfsCommonCreateCallout+0x20
9a6bbd1c 82a81215 9a62b8dc 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
9a62b840 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExpCheckForIoPriorityBoost+46
82aafeeb 8b8680020000    mov     eax,dword ptr [esi+280h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExpCheckForIoPriorityBoost+46

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac

FAILURE_BUCKET_ID:  0xA_nt!ExpCheckForIoPriorityBoost+46

BUCKET_ID:  0xA_nt!ExpCheckForIoPriorityBoost+46

Followup: MachineOwner
---------





90fcf000 90ffb000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8882c000 88874000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8dcb9000 8dd13000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
8e000000 8e012000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
889c7000 889d0000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
91837000 918386c0   ASACPI   ASACPI.sys   Wed Jul 15 23:28:28 2009 (4A5E9E5C)
8899b000 889a4000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
889a4000 889c7000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
889ef000 889f6000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8e08f000 8e09d000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88691000 88699000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
95caf000 95cc8000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
97890000 978ae000   cdd      cdd.dll      unavailable (00000000)
889d0000 889ef000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
886db000 88786000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88bb7000 88bdc000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88699000 886db000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88c01000 88c5e000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
826a7000 826c2000   COMMONFX COMMONFX.SYS Thu Mar 18 07:06:07 2010 (4BA2091F)
90e15000 90e22000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
827e5000 827f2000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8e013000 8e077000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8260b000 826a7000   ctac32k  ctac32k.sys  Thu Mar 18 07:08:52 2010 (4BA209C4)
90f02000 90f81600   ctaud2k  ctaud2k.sys  Thu Mar 18 07:04:11 2010 (4BA208AB)
826c2000 8274d000   CTAUDFX  CTAUDFX.SYS  Thu Mar 18 07:06:22 2010 (4BA2092E)
90f9b000 90fcf000   ctoss2k  ctoss2k.sys  Thu Mar 18 07:03:24 2010 (4BA2087C)
9182f000 91837000   ctprxy2k ctprxy2k.sys Thu Mar 18 07:04:14 2010 (4BA208AE)
8274d000 827db000   CTSBLFX  CTSBLFX.SYS  Thu Mar 18 07:06:45 2010 (4BA20945)
8255f000 82588000   ctsfm2k  ctsfm2k.sys  Thu Mar 18 07:03:15 2010 (4BA20873)
8e077000 8e08f000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8dc2b000 8dc37000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88e08000 88e19000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
90f82000 90f9b000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
82600000 82609000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
827f2000 827fd000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
82588000 82599000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
827db000 827e5000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
8e0d0000 8e187000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
8f7c6000 8f7ff000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
82530000 8255f000   emupia2k emupia2k.sys Thu Mar 18 07:03:13 2010 (4BA20871)
90e0a000 90e15000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
88a39000 88a4a000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
91f07000 91f11000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
88a05000 88a39000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
88c6c000 88c75000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
88dbc000 88dee000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88f6c000 88f9d000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82426000 82530000   ha10kx2k ha10kx2k.sys Thu Mar 18 07:03:27 2010 (4BA2087F)
82e21000 82e58000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
91f72000 91f9d000   hap16v2k hap16v2k.sys Thu Mar 18 07:03:31 2010 (4BA20883)
8e1d2000 8e1f1000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
91f22000 91f72000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
8240b000 8241e000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
8241e000 82424480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
82400000 8240b000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
95c2a000 95caf000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
88e00000 88e08000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
88926000 8892d000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
8e0be000 8e0d0000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8dc14000 8dc2b000   ISODrive ISODrive.sys Tue Feb 10 04:22:07 2009 (4991473F)
88942000 8895f000   jraid    jraid.sys    Fri Oct 29 06:12:27 2010 (4CCA9E0B)
91e99000 91ea6000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91fc7000 91fd3000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
80ba7000 80baf000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
90ece000 90f02000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
88ba4000 88bb7000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88d6a000 88d8f000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
825f6000 825fdd80   LHidFilt LHidFilt.Sys Tue Aug 24 13:20:48 2010 (4C73FF70)
91fd3000 91fe3000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
91fa8000 91faf780   LMouFilt LMouFilt.Sys Tue Aug 24 13:20:53 2010 (4C73FF75)
825bb000 825d6000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
825f0000 825f5580   LUsbFilt LUsbFilt.Sys Tue Aug 24 13:20:57 2010 (4C73FF79)
88608000 88680000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
919f1000 919fe000   modem    modem.sys    Mon Jul 13 19:55:24 2009 (4A5BC96C)
825b0000 825bb000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
91ea6000 91eb3000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
91f9d000 91fa8000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88985000 8899b000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
95cc8000 95cda000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
95cda000 95cfd000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
95cfd000 95d38000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
95d38000 95d53000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8dc7e000 8dc89000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8887d000 88885000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88b79000 88ba4000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8dc0a000 8dc14000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88fed000 88ffd000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88c75000 88d2c000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
91e1c000 91e27000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
91e27000 91e49000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
91f11000 91f22000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8dd6b000 8dd79000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8dd13000 8dd45000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
88d2c000 88d6a000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8dc89000 8dc97000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8dc00000 8dc0a000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a11000 82e21000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
88a4a000 88b79000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
88bf8000 88bff000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
8f7c4000 8f7c5040   nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
8ee27000 8f7c35a0   nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
8dd4c000 8dd6b000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
888ba000 888cb000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
88885000 888af000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8893b000 88942000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
8892d000 8893b000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
88c5e000 88c6c000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
95d53000 95dea000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
91800000 9182f000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
88680000 88691000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
91e04000 91e1c000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
91e49000 91e61000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
91e61000 91e78000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
91e78000 91e8f000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8ddb6000 8ddf7000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
91e8f000 91e99000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8dc66000 8dc6e000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8dc6e000 8dc76000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8dc76000 8dc7e000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88d8f000 88dbc000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
91fe3000 91ff6000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8895f000 88985000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
95dea000 95df4000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
90e00000 90e0a000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8dd79000 8dd93000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
88fe5000 88fed000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
9ac60000 9acb1000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
9ac11000 9ac60000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
95c00000 95c21000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
91eb3000 91eb4380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88e23000 88f6c000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
90e22000 90e2f000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8dcae000 8dcb9000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8dc97000 8dcae000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8dda6000 8ddb6000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
97860000 97869000   TSDDD    TSDDD.dll    Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8e09d000 8e0be000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
91eb5000 91ec3000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
91fb0000 91fc7000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
82609000 8260a700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
8ee0b000 8ee1a000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
91ec3000 91f07000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8e187000 8e1d2000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
82599000 825b0000   USBSTOR  USBSTOR.SYS  Mon Jul 13 19:51:19 2009 (4A5BC877)
8ee00000 8ee0b000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
888af000 888ba000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88800000 8880c000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8dc38000 8dc59000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88f9d000 88fa5380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
888cb000 888db000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
888db000 88926000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
88fa6000 88fe5000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
90e82000 90ece000   VSTBS23  VSTBS23.SYS  Wed Oct 15 20:30:15 2008 (48F68B17)
9193c000 919f1000   VSTCNXT3 VSTCNXT3.SYS Wed Oct 15 20:29:13 2008 (48F68AD9)
9183a000 9193c000   VSTDPV3  VSTDPV3.SYS  Wed Oct 15 20:32:04 2008 (48F68B84)
8dd93000 8dda6000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8dc59000 8dc66000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88786000 887f7000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8881e000 8882c000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8dd45000 8dd4c000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
97600000 9784b000   win32k   win32k.sys   Tue Aug 31 22:34:29 2010 (4C7DBBB5)
88874000 8887d000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
825d6000 825f0000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
9acb1000 9acd1480   WUDFRd   WUDFRd.sys   Mon Jul 13 19:50:44 2009 (4A5BC854)
90e33000 90e82000   yk62x86  yk62x86.sys  Wed Sep 15 10:07:11 2010 (4C90D30F)

Unloaded modules:
9acd2000 9ad3c000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
95d53000 95d6b000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
88dee000 88dfb000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
88bdc000 88be7000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
88e19000 88e22000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
88be7000 88bf8000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Hello and thanks for replying!


Can you tell me how to update ISODrive.sys?

and I cant seem to find Conexant Soft Modem in device manager, sorry Im a noob in this D:
 
Hello and thanks for replying!


Can you tell me how to update ISODrive.sys?

and I cant seem to find Conexant Soft Modem in device manager, sorry Im a noob in this D:


ISODRIVE - Bootable CD maker, ISO CD image creator/editor/converter and virtual CD software - three powerful and versatile products from EZB Systems.

Conexant - these drivers found in your crash dump:

VSTCNXT3.SYS Wed Oct 15 20:29:13 2008
VSTDPV3.SYS Wed Oct 15 20:32:04 2008
VSTBS23.SYS Wed Oct 15 20:30:15 2008
 
Thanks for the reply, ill try to remove my 56k modem later and see if it fixes the problem

I've done chkdsk too and nothing came up

Hopefully after removing the hardware It wont happen again, thanks :D
 
Hi, After i removed the 56k modem and uninstalled ultraiso my pc went well for 2 days then its started having blue screen again.
 

Attachments

  • Seven Forums.rar
    106.7 KB · Views: 185
Back
Top