BSOD Help

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Alinay Gomez, Mar 6, 2011.

  1. Alinay Gomez

    Alinay Gomez New Member

    Joined:
    Mar 6, 2011
    Messages:
    4
    Likes Received:
    0
    Hey guys, I have been getting a lot of BSODs lately, I think it might be related to Hard Drive problems because when I try to download things they come out corrupt. Here are some mini dumps if anyone would be kind enough to look through some so I can fix the issue as soon as possible, thanks a lot!

    memory.

    View attachment Minidump.rar
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You have some very old drivers that you should update or uninstall:


    1. Analog Devices ADC Analyzer/SwiftForth/Disspy
    giveio.sys Wed Apr 03 22:33:25 1996


    2. AMD motherboard
    AmdLLD.sys Fri Jun 29 15:47:32 2007


    3. Eset
    eamon.sys Fri Sep 11 01:12:15 2009


    4. JMicron JMB36X RAID Driver
    jraid.sys Thu Aug 13 04:10:15 2009


    5. Realtek NDIS Protocol Driver
    RtNdPt60.sys Sun Jul 19 22:26:38 2009


    6. Power ISO
    SCDEmu.SYS Sun Jul 26 22:43:19 2009






    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030511-14664-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x83214000 PsLoadedModuleList = 0x8335c810
    Debug session time: Sat Mar  5 10:26:48.174 2011 (UTC - 5:00)
    System Uptime: 0 days 10:47:57.171
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 8344bcb1, a7be36dc, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!CmpRemoveFromDelayedClose+54 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8344bcb1, The address that the exception occurred at
    Arg3: a7be36dc, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpRemoveFromDelayedClose+54
    8344bcb1 890a            mov     dword ptr [edx],ecx
    
    TRAP_FRAME:  a7be36dc -- (.trap 0xffffffffa7be36dc)
    ErrCode = 00000002
    eax=893894dc ebx=8337b0c0 ecx=bb8f7edc edx=2087a1bc esi=89389468 edi=86015d48
    eip=8344bcb1 esp=a7be3750 ebp=a7be3760 iopl=0         nv up ei pl nz ac po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010212
    nt!CmpRemoveFromDelayedClose+0x54:
    8344bcb1 890a            mov     dword ptr [edx],ecx  ds:0023:2087a1bc=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 8348acdd to 8344bcb1
    
    STACK_TEXT:  
    a7be3760 8348acdd 0000fffe 89389468 a7be380c nt!CmpRemoveFromDelayedClose+0x54
    a7be3770 834555ac a7be3a00 a7be3a28 00000000 nt!CmpReferenceKeyControlBlock+0x4a
    a7be37b4 83468f15 a7be37f0 00000004 a7be3a28 nt!CmpKcbCacheLookup+0x5fa
    a7be39a0 8344a901 a08824c8 a7be3a60 a7be39e4 nt!CmpBuildHashStackAndLookupCache+0x2e6
    a7be3b48 8343521f a08824c8 859f5980 881d47c8 nt!CmpParseKey+0x36e
    a7be3bc4 8345b28d 0000011e a7be3c18 00000040 nt!ObpLookupObjectName+0x4fa
    a7be3c20 834529e4 039aec44 859f5980 00000001 nt!ObOpenObjectByName+0x159
    a7be3d00 8344d737 039af19c 00000001 039aec44 nt!CmOpenKey+0x1f4
    a7be3d1c 8325744a 039af19c 00000001 039aec44 nt!NtOpenKeyEx+0x18
    a7be3d1c 777e64f4 039af19c 00000001 039aec44 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    039aee78 00000000 00000000 00000000 00000000 0x777e64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!CmpRemoveFromDelayedClose+54
    8344bcb1 890a            mov     dword ptr [edx],ecx
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpRemoveFromDelayedClose+54
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    FAILURE_BUCKET_ID:  0x8E_nt!CmpRemoveFromDelayedClose+54
    
    BUCKET_ID:  0x8E_nt!CmpRemoveFromDelayedClose+54
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030411-18080-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x83216000 PsLoadedModuleList = 0x8335e810
    Debug session time: Fri Mar  4 21:39:16.146 2011 (UTC - 5:00)
    System Uptime: 0 days 0:16:35.144
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 8341946b, 9db3bb94, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!HvpIsFreeNeighbor+49 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8341946b, The address that the exception occurred at
    Arg3: 9db3bb94, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!HvpIsFreeNeighbor+49
    8341946b 8b0e            mov     ecx,dword ptr [esi]
    
    TRAP_FRAME:  9db3bb94 -- (.trap 0xffffffff9db3bb94)
    ErrCode = 00000000
    eax=a55c3ff8 ebx=00000000 ecx=255be4b8 edx=9db3bc2c esi=255be4b8 edi=a55ba000
    eip=8341946b esp=9db3bc08 ebp=9db3bc10 iopl=0         nv up ei pl nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010207
    nt!HvpIsFreeNeighbor+0x49:
    8341946b 8b0e            mov     ecx,dword ptr [esi]  ds:0023:255be4b8=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 834136db to 8341946b
    
    STACK_TEXT:  
    9db3bc10 834136db a55339d0 00000000 0005eff8 nt!HvpIsFreeNeighbor+0x49
    9db3bc30 8341657b a55339d0 0005eff8 a55339d0 nt!HvFreeCell+0xde
    9db3bc40 83410aa1 a55c020c 00000000 a1512aa8 nt!CmpFreeValue+0x3d
    9db3bc60 83412d6b 0005b208 00000005 a13e5460 nt!CmpFreeKeyByCell+0x174
    9db3bcc4 83413589 a13e5460 00000af4 043aeca4 nt!CmDeleteKey+0x86a
    9db3bd28 8325944a 00000af4 043aecd4 77a164f4 nt!NtDeleteKey+0x332
    9db3bd28 77a164f4 00000af4 043aecd4 77a164f4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    043aecd4 00000000 00000000 00000000 00000000 0x77a164f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!HvpIsFreeNeighbor+49
    8341946b 8b0e            mov     ecx,dword ptr [esi]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!HvpIsFreeNeighbor+49
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    FAILURE_BUCKET_ID:  0x8E_nt!HvpIsFreeNeighbor+49
    
    BUCKET_ID:  0x8E_nt!HvpIsFreeNeighbor+49
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030611-19640-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x83445000 PsLoadedModuleList = 0x8358d810
    Debug session time: Sun Mar  6 12:50:26.011 2011 (UTC - 5:00)
    System Uptime: 0 days 0:42:01.993
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    .....
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    NTFS_FILE_SYSTEM (24)
        If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
        parameters are the exception record and context record. Do a .cxr
        on the 3rd parameter and then kb to obtain a more informative stack
        trace.
    Arguments:
    Arg1: 001904fb
    Arg2: 8f657b68
    Arg3: 8f657740
    Arg4: 8baba51e
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_RECORD:  8f657b68 -- (.exr 0xffffffff8f657b68)
    ExceptionAddress: 8baba51e (Ntfs!NtfsCommonClose+0x000004b5)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000001
       Parameter[1]: 0a75a57c
    Attempt to write to address 0a75a57c
    
    CONTEXT:  8f657740 -- (.cxr 0xffffffff8f657740)
    eax=0a75a57c ebx=8a75a530 ecx=8a75a57c edx=00180041 esi=86564338 edi=8f657cd0
    eip=8baba51e esp=8f657c30 ebp=8f657c6c iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    Ntfs!NtfsCommonClose+0x4b5:
    8baba51e 8908            mov     dword ptr [eax],ecx  ds:0023:0a75a57c=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  1
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000001
    
    EXCEPTION_PARAMETER2:  0a75a57c
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 835ad718
    Unable to read MiSystemVaType memory at 8358d160
     0a75a57c 
    
    FOLLOWUP_IP: 
    Ntfs!NtfsCommonClose+4b5
    8baba51e 8908            mov     dword ptr [eax],ecx
    
    FAULTING_IP: 
    Ntfs!NtfsCommonClose+4b5
    8baba51e 8908            mov     dword ptr [eax],ecx
    
    BUGCHECK_STR:  0x24
    
    LAST_CONTROL_TRANSFER:  from 8bad94c3 to 8baba51e
    
    STACK_TEXT:  
    8f657c6c 8bad94c3 86564338 8a75a318 8a75a228 Ntfs!NtfsCommonClose+0x4b5
    8f657d00 834b2f3b 00000000 00000000 864d5b40 Ntfs!NtfsFspClose+0x118
    8f657d50 836536bb 80000000 a2e7c2b0 00000000 nt!ExpWorkerThread+0x10d
    8f657d90 835050f9 834b2e2e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  Ntfs!NtfsCommonClose+4b5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf45
    
    STACK_COMMAND:  .cxr 0xffffffff8f657740 ; kb
    
    FAILURE_BUCKET_ID:  0x24_Ntfs!NtfsCommonClose+4b5
    
    BUCKET_ID:  0x24_Ntfs!NtfsCommonClose+4b5
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\030611-19531-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x83407000 PsLoadedModuleList = 0x8354f810
    Debug session time: Sun Mar  6 13:03:08.539 2011 (UTC - 5:00)
    System Uptime: 0 days 0:12:12.146
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 836a1f51, 8db93bd0, 8db937b0}
    
    Probably caused by : ntkrpamp.exe ( nt!CmpDelayCloseWorker+79 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 836a1f51, The address that the exception occurred at
    Arg3: 8db93bd0, Exception Record Address
    Arg4: 8db937b0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpDelayCloseWorker+79
    836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8)
    
    EXCEPTION_RECORD:  8db93bd0 -- (.exr 0xffffffff8db93bd0)
    ExceptionAddress: 836a1f51 (nt!CmpDelayCloseWorker+0x00000079)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000001
       Parameter[1]: 36f43c5c
    Attempt to write to address 36f43c5c
    
    CONTEXT:  8db937b0 -- (.cxr 0xffffffff8db937b0)
    eax=b6f43468 ebx=46188e4e ecx=8db93cd4 edx=36f43c5c esi=0000092e edi=8356e0c0
    eip=836a1f51 esp=8db93c98 ebp=8db93d00 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!CmpDelayCloseWorker+0x79:
    836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8) ds:0023:36f43c5c=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000001
    
    EXCEPTION_PARAMETER2:  36f43c5c
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8356f718
    Unable to read MiSystemVaType memory at 8354f160
     36f43c5c 
    
    FOLLOWUP_IP: 
    nt!CmpDelayCloseWorker+79
    836a1f51 c702a8e05683    mov     dword ptr [edx],offset nt!CmpDelayedLRUListHead (8356e0a8)
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from 83474f3b to 836a1f51
    
    STACK_TEXT:  
    8db93d00 83474f3b 00000000 00000000 85dd1a70 nt!CmpDelayCloseWorker+0x79
    8db93d50 836156bb 00000001 a02dbb88 00000000 nt!ExpWorkerThread+0x10d
    8db93d90 834c70f9 83474e2e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpDelayCloseWorker+79
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
    
    STACK_COMMAND:  .cxr 0xffffffff8db937b0 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!CmpDelayCloseWorker+79
    
    BUCKET_ID:  0x7E_nt!CmpDelayCloseWorker+79
    
    Followup: MachineOwner
    ---------
    
    
    



    Drivers:

    Code:
    start    end        module name
    92d8f000 92dbb000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8b89f000 8b8e7000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    91b12000 91b6c000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    929eb000 929fd000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    9324c000 9325b000   AmdLLD   AmdLLD.sys   Fri Jun 29 15:47:32 2007 (468561D4)
    8b9f0000 8b9f9000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    8b9c4000 8b9cd000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8b9cd000 8b9f0000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    9221f000 929a5000   atikmdag atikmdag.sys Wed Jan 26 17:42:31 2011 (4D40A357)
    92159000 92198000   atikmpag atikmpag.sys Wed Jan 26 17:13:11 2011 (4D409C77)
    9aed0000 9af1d000   ATMFD    ATMFD.DLL    unavailable (00000000)
    929b2000 929bc000   aubridge aubridge.sys Wed Feb 15 09:41:21 2006 (43F33D91)
    91a61000 91a68000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    92118000 92126000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    83ab6000 83abe000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    9bcb7000 9bcd0000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    9aeb0000 9aece000   cdd      cdd.dll      unavailable (00000000)
    83a00000 83a1f000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    83b00000 83bab000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    8bbc9000 8bbee000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    83abe000 83b00000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8bc08000 8bc65000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    929a5000 929b2000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    9bd6c000 9bd6f180   cpuz132_x32 cpuz132_x32.sys Thu Mar 26 19:16:27 2009 (49CC0CCB)
    995a6000 995b3000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    9209c000 92100000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    92100000 92118000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    92090000 9209c000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    8be00000 8be11000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    92200000 92219000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    995be000 995c7000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    995b3000 995be000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    995c7000 995d8000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    9950e000 99518000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    92c11000 92cc8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    92cc8000 92d01000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    8303a000 83106000   eamon    eamon.sys    Fri Sep 11 01:12:15 2009 (4AA9DC2F)
    91a68000 91a85000   ehdrv    ehdrv.sys    Fri Sep 11 01:12:49 2009 (4AA9DC51)
    9c1ad000 9c1d7000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    92dbb000 92dc6000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
    8ba4b000 8ba5c000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    932bd000 932c7000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
    8ba17000 8ba4b000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8bc73000 8bc7c000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    8bdc3000 8bdf5000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    8bf60000 8bf91000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    92d85000 92d8f000   GEARAspiWDM GEARAspiWDM.sys Thu Mar 19 11:32:37 2009 (49C26595)
    8bff9000 8bff9680   giveio   giveio.sys   Wed Apr 03 22:33:25 1996 (316334F5)
    83817000 8384e000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    92d01000 92d20000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    932d8000 93328000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    9952e000 99541000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    99541000 99547480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    99523000 9952e000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    9bc32000 9bcb7000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8bff1000 8bff9000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    92de8000 92e00000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    92147000 92159000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8b800000 8b81b000   jraid    jraid.sys    Thu Aug 13 04:10:15 2009 (4A83CA67)
    92c00000 92c0d000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80bd0000 80bd8000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    92198000 921cc000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8bbb6000 8bbc9000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    8bd71000 8bd96000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    932ad000 932bb000   libusb0  libusb0.sys  Wed Mar 09 14:50:17 2005 (422F5379)
    83120000 83130000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    995d8000 995f3000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    83a2d000 83aa5000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    99518000 99523000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    9323d000 9324a000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    99552000 9955d000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8b9ae000 8b9c4000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    91a33000 91a59680   MpFilter MpFilter.sys Tue Sep 14 17:23:59 2010 (4C8FE7EF)
    9208a000 9208f900   MpKsl28377136 MpKsl28377136.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
    9c1e3000 9c1e8900   MpKsld9f0ad31 MpKsld9f0ad31.sys Tue Mar 30 22:06:14 2010 (4BB2AE16)
    9bd5b000 9bd64200   MpNWMon  MpNWMon.sys  Tue Sep 14 17:23:50 2010 (4C8FE7E6)
    9bcd0000 9bce2000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    9bce2000 9bd05000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    9bd05000 9bd40000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    9bd40000 9bd5b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    91ad7000 91ae2000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    8b8f0000 8b8f8000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    8bb8b000 8bbb6000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    92080000 9208a000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    8bfe1000 8bff1000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    8bc7c000 8bd33000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    921e4000 921ef000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    83176000 83186000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    92000000 92022000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    932c7000 932d8000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    91bd5000 91be3000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    91b6c000 91b9e000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    8bd33000 8bd71000   NETIO    NETIO.SYS    Thu Apr 08 22:32:21 2010 (4BBE91B5)
    93328000 933fc000   netr28u  netr28u.sys  Fri Jan 15 03:15:35 2010 (4B502427)
    9c1d7000 9c1e2c00   NisDrvWFP NisDrvWFP.sys Tue Sep 14 17:24:12 2010 (4C8FE7FC)
    91ae2000 91af0000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    92076000 92080000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    83407000 83817000   nt       ntkrpamp.exe Sat Feb 27 02:33:35 2010 (4B88CACF)
    8ba5c000 8bb8b000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    91a5a000 91a61000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    83130000 83176000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    91ba5000 91bc4000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    92dd0000 92de8000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
    8b92d000 8b93e000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    9bd65000 9bd6c000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
    8b8f8000 8b922000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8b999000 8b9a0000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8b9a0000 8b9ae000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8bc65000 8bc73000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9c03e000 9c0d5000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    9955d000 99565800   point32  point32.sys  Tue Jun 29 04:54:24 2010 (4C29B4C0)
    929bc000 929eb000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    83aa5000 83ab6000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    921cc000 921e4000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    83be2000 83bfa000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    93205000 9321c000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    9321c000 93233000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    92035000 92076000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    93233000 9323d000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    91abf000 91ac7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    91ac7000 91acf000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    91acf000 91ad7000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    8bd96000 8bdc3000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    83186000 83199000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    99205000 9950d180   RTKVHDA  RTKVHDA.sys  Fri Sep 03 04:00:20 2010 (4C80AB14)
    83199000 831a5000   RtNdPt60 RtNdPt60.sys Sun Jul 19 22:26:38 2009 (4A63D5DE)
    91a23000 91a30880   SCDEmu   SCDEmu.SYS   Sun Jul 26 22:43:19 2009 (4A6D1447)
    83bab000 83bd1000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
    9c0d5000 9c0df000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    92dc6000 92dd0000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    91be3000 91bfd000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    8bfd9000 8bfe1000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    9c15c000 9c1ad000   srv      srv.sys      Tue Dec 08 03:05:37 2009 (4B1E08D1)
    9c10d000 9c15c000   srv2     srv2.sys     Mon Jul 13 19:14:52 2009 (4A5BBFEC)
    9c0df000 9c100000   srvnet   srvnet.sys   Tue Dec 08 03:05:06 2009 (4B1E08B2)
    9324a000 9324b380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8be17000 8bf60000   tcpip    tcpip.sys    Thu Apr 08 22:32:59 2010 (4BBE91DB)
    9c100000 9c10d000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    91b07000 91b12000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    91af0000 91b07000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    91a13000 91a23000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    9ae80000 9ae89000   TSDDD    TSDDD.dll    unavailable (00000000)
    92126000 92147000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    99566000 995a6000   udfs     udfs.sys     Mon Jul 13 19:14:09 2009 (4A5BBFC1)
    9325b000 93269000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    932bb000 932bc700   usbd     usbd.sys     Mon Jul 13 19:51:05 2009 (4A5BC869)
    92d76000 92d85000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    93269000 932ad000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    92d2b000 92d76000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    92d20000 92d2b000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8b922000 8b92d000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    91a85000 91a91000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    91a91000 91ab2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8bf91000 8bf99380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    8b93e000 8b94e000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8b94e000 8b999000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    8bf9a000 8bfd9000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    99548000 99552000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    91bc4000 91bd5000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    91a00000 91a13000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    91ab2000 91abf000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    8b820000 8b891000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    8b891000 8b89f000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    91b9e000 91ba5000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    9ac20000 9ae6a000   win32k   win32k.sys   unavailable (00000000)
    8b8e7000 8b8f0000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    83106000 83120000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    8bbee000 8bbfb000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    8bdf5000 8be00000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    8ba00000 8ba09000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    83bd1000 83be2000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    
    
     
  3. Alinay Gomez

    Alinay Gomez New Member

    Joined:
    Mar 6, 2011
    Messages:
    4
    Likes Received:
    0
    Hu.. that's it? I would have never thought it was jut old drivers. How would I get rid of these? Because I'm sure I don't use any of the things mentioned above and my motherboard is a Intel one...
     
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Update devices drivers and uninstall the software that you don't use. Those are old drivers, not quite compatible with Windows 7:

    Code:
    [B]giveio.sys Wed Apr 03 22:33:25 1996
    AmdLLD.sys Fri Jun 29 15:47:32 2007
    eamon.sys Fri Sep 11 01:12:15 2009
    jraid.sys Thu Aug 13 04:10:15 2009
    RtNdPt60.sys Sun Jul 19 22:26:38 2009
    SCDEmu.SYS Sun Jul 26 22:43:19 2009[/B]
     

Share This Page

Loading...