Windows 7 randam occuring Blue screen

theceller

New Member
Joined
Jun 4, 2011
Messages
6
It comes up every 1 or 2 days. My OS is windows 7 64 Pro. Thanks!
 


Attachments

Solution
Your Avast Antivirus software is the cause, remove it and use Link Removed due to 404 Error

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80002e38e88}

Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load...
Your Avast Antivirus software is the cause, remove it and use Link Removed due to 404 Error

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80002e38e88}

Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )



UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002e38e88

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002e6fc69 to fffff80002e70700

STACK_TEXT:  
fffff880`009f1ce8 fffff800`02e6fc69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009f1cf0 fffff800`02e6e132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f1e30 fffff800`02e38e88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`03115a10 fffff880`01606c5a : 01000201`00020100 00010100`01010002 00000000`00000101 00000000`00000000 : nt!SeAccessCheckFromState+0x58
fffff880`03116100 fffff880`0160494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`03116170 fffff880`016069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`031161c0 fffff880`01606845 : fffffa80`090a9110 fffffa80`0a3b6380 fffff880`031163e8 fffff880`03116b20 : NETIO!FilterMatch+0x95
fffff880`03116210 fffff880`01607ccb : 00000000`00000000 00000000`00000000 fffff880`03116b20 fffff880`031163d0 : NETIO!IndexListClassify+0x69
fffff880`03116290 fffff880`0183d417 : fffff880`03116768 fffff880`03116768 fffff880`031174a0 fffffa80`03e4dd50 : NETIO!KfdClassify+0xa4e
fffff880`03116600 fffff880`0183683e : fffff880`01945690 00000000`00000000 fffffa80`04549c90 00000000`00000000 : tcpip!WfpAleClassify+0x57
fffff880`03116640 fffff880`01835cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`03116d50 fffff880`01839886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`03117020 fffff880`0183c5e4 : 00000000`00000000 fffff880`03117458 fffff880`03117460 fffff880`03117d00 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`03117110 fffff880`01835019 : fffff880`031175c0 fffff880`031175d8 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`03117380 fffff880`01863ef6 : 00000000`00000000 fffff880`03110002 fffffa80`092e8900 fffffa80`04c68900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`03117550 fffff880`018691ee : fffffa80`092e43b0 fffff880`01602804 fffff880`0196b9a0 fffffa80`04549c90 : tcpip!IppSendDatagramsCommon+0x526
fffff880`03117820 fffff880`01833db8 : fffffa80`04549c90 fffffa80`03e4dd50 fffffa80`03e4dd50 fffffa80`092e43b0 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`03117860 fffff880`0183432d : fffffa80`09664380 fffffa80`08a2c2c0 fffff880`031181b0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`03117be0 fffff880`01833fb5 : fffff880`03118110 00000000`00008900 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
fffff880`03117fd0 fffff800`02e7fe5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`03118000 fffff880`01834578 : fffff880`01833fa0 fffff880`03118110 fffff880`03118302 fffffa80`085bc500 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`031180e0 fffff880`0406ef45 : fffffa80`04a2af70 fffffa80`03da0260 fffffa80`08b75010 fffffa80`0954adde : tcpip!UdpTlProviderSendMessages+0x78
fffff880`03118160 fffff880`0406eff2 : 00000000`00000002 fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`0954ada8 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`03118240 fffff880`040981a8 : fffffa80`07e6ff70 00000000`000006f8 fffffa80`06e9f5f0 fffffa80`07e6ff70 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`03118270 fffffa80`07e6ff70 : 00000000`000006f8 fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`04b88900 : aswTdi+0x11a8
fffff880`03118278 00000000`000006f8 : fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`04b88900 fffffa80`04548900 : 0xfffffa80`07e6ff70
fffff880`03118280 fffffa80`06e9f5f0 : fffffa80`07e6ff70 fffffa80`04b88900 fffffa80`04548900 ffff0089`c0a80105 : 0x6f8
fffff880`03118288 fffffa80`07e6ff70 : fffffa80`04b88900 fffffa80`04548900 ffff0089`c0a80105 ffff0000`071ba107 : 0xfffffa80`06e9f5f0
fffff880`03118290 fffffa80`04b88900 : fffffa80`04548900 ffff0089`c0a80105 ffff0000`071ba107 00000000`0000003e : 0xfffffa80`07e6ff70
fffff880`03118298 fffffa80`04548900 : ffff0089`c0a80105 ffff0000`071ba107 00000000`0000003e fffffa80`06e23f20 : 0xfffffa80`04b88900
fffff880`031182a0 ffff0089`c0a80105 : ffff0000`071ba107 00000000`0000003e fffffa80`06e23f20 fffffa80`06e9f5f0 : 0xfffffa80`04548900
fffff880`031182a8 ffff0000`071ba107 : 00000000`0000003e fffffa80`06e23f20 fffffa80`06e9f5f0 fffffa80`07e6fe10 : 0xffff0089`c0a80105
fffff880`031182b0 00000000`0000003e : fffffa80`06e23f20 fffffa80`06e9f5f0 fffffa80`07e6fe10 fffffa80`06ea1930 : 0xffff0000`071ba107
fffff880`031182b8 fffffa80`06e23f20 : fffffa80`06e9f5f0 fffffa80`07e6fe10 fffffa80`06ea1930 fffff880`04098647 : 0x3e
fffff880`031182c0 fffffa80`06e9f5f0 : fffffa80`07e6fe10 fffffa80`06ea1930 fffff880`04098647 fffff880`031183b0 : 0xfffffa80`06e23f20
fffff880`031182c8 fffffa80`07e6fe10 : fffffa80`06ea1930 fffff880`04098647 fffff880`031183b0 fffff880`040a971a : 0xfffffa80`06e9f5f0
fffff880`031182d0 fffffa80`06ea1930 : fffff880`04098647 fffff880`031183b0 fffff880`040a971a fffffa80`06ea17e0 : 0xfffffa80`07e6fe10
fffff880`031182d8 fffff880`04098647 : fffff880`031183b0 fffff880`040a971a fffffa80`06ea17e0 00000000`00000000 : 0xfffffa80`06ea1930
fffff880`031182e0 fffff880`031183b0 : fffff880`040a971a fffffa80`06ea17e0 00000000`00000000 fffffa80`06e23f20 : aswTdi+0x1647
fffff880`031182e8 fffff880`040a971a : fffffa80`06ea17e0 00000000`00000000 fffffa80`06e23f20 fffffa80`088bb200 : 0xfffff880`031183b0
fffff880`031182f0 fffff880`040a9542 : 00000000`00000000 fffff880`031183d0 fffffa80`088bb200 fffffa80`07e6fe10 : netbt!GetIrp+0x52
fffff880`03118320 fffff880`040a9f61 : fffffa80`0954ada8 fffffa80`0954ada8 fffffa80`0939ac00 fffff880`03118420 : netbt!TdiSendDatagram+0x187
fffff880`03118390 fffff880`040b6329 : fffffa80`06e10b80 fffffa80`0954abf0 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
fffff880`03118420 fffff880`040b60e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`040d0089 : netbt!UdpSendResponse+0x4e0
fffff880`031184a0 fffff880`040aabe7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`031185d0 fffff880`040a8b47 : 00000000`00000032 fffff880`069d50d0 00000000`00000032 fffff880`03118802 : netbt!NameSrvHndlrNotOs+0xca
fffff880`03118610 fffff880`0409d443 : fffffa80`09c0d4e0 00000000`00000032 fffff880`040a2820 fffffa80`09c0d4e0 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`031186b0 fffffa80`09c0d4e0 : 00000000`00000032 fffff880`040a2820 fffffa80`09c0d4e0 00000000`00000000 : aswTdi+0x6443
fffff880`031186b8 00000000`00000032 : fffff880`040a2820 fffffa80`09c0d4e0 00000000`00000000 00000000`00000004 : 0xfffffa80`09c0d4e0
fffff880`031186c0 fffff880`040a2820 : fffffa80`09c0d4e0 00000000`00000000 00000000`00000004 00000000`00000032 : 0x32
fffff880`031186c8 fffffa80`09c0d4e0 : 00000000`00000000 00000000`00000004 00000000`00000032 00000000`00000032 : aswTdi+0xb820
fffff880`031186d0 00000000`00000000 : 00000000`00000004 00000000`00000032 00000000`00000032 fffff880`031187f8 : 0xfffffa80`09c0d4e0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!CompareSecurityContexts+6a
fffff880`01606c5a 448b442470      mov     r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------
 


Solution
Unfortunately the blue screen problem did not go away after removing Avast and installing mse. I attached the latest minidump for your reference.

Please help!!

Your Avast Antivirus software is the cause, remove it and use Link Removed due to 404 Error

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff80002e38e88}

Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )



UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002e38e88

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002e6fc69 to fffff80002e70700

STACK_TEXT:  
fffff880`009f1ce8 fffff800`02e6fc69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009f1cf0 fffff800`02e6e132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f1e30 fffff800`02e38e88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`03115a10 fffff880`01606c5a : 01000201`00020100 00010100`01010002 00000000`00000101 00000000`00000000 : nt!SeAccessCheckFromState+0x58
fffff880`03116100 fffff880`0160494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`03116170 fffff880`016069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`031161c0 fffff880`01606845 : fffffa80`090a9110 fffffa80`0a3b6380 fffff880`031163e8 fffff880`03116b20 : NETIO!FilterMatch+0x95
fffff880`03116210 fffff880`01607ccb : 00000000`00000000 00000000`00000000 fffff880`03116b20 fffff880`031163d0 : NETIO!IndexListClassify+0x69
fffff880`03116290 fffff880`0183d417 : fffff880`03116768 fffff880`03116768 fffff880`031174a0 fffffa80`03e4dd50 : NETIO!KfdClassify+0xa4e
fffff880`03116600 fffff880`0183683e : fffff880`01945690 00000000`00000000 fffffa80`04549c90 00000000`00000000 : tcpip!WfpAleClassify+0x57
fffff880`03116640 fffff880`01835cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`03116d50 fffff880`01839886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`03117020 fffff880`0183c5e4 : 00000000`00000000 fffff880`03117458 fffff880`03117460 fffff880`03117d00 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`03117110 fffff880`01835019 : fffff880`031175c0 fffff880`031175d8 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`03117380 fffff880`01863ef6 : 00000000`00000000 fffff880`03110002 fffffa80`092e8900 fffffa80`04c68900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`03117550 fffff880`018691ee : fffffa80`092e43b0 fffff880`01602804 fffff880`0196b9a0 fffffa80`04549c90 : tcpip!IppSendDatagramsCommon+0x526
fffff880`03117820 fffff880`01833db8 : fffffa80`04549c90 fffffa80`03e4dd50 fffffa80`03e4dd50 fffffa80`092e43b0 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`03117860 fffff880`0183432d : fffffa80`09664380 fffffa80`08a2c2c0 fffff880`031181b0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`03117be0 fffff880`01833fb5 : fffff880`03118110 00000000`00008900 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
fffff880`03117fd0 fffff800`02e7fe5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`03118000 fffff880`01834578 : fffff880`01833fa0 fffff880`03118110 fffff880`03118302 fffffa80`085bc500 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`031180e0 fffff880`0406ef45 : fffffa80`04a2af70 fffffa80`03da0260 fffffa80`08b75010 fffffa80`0954adde : tcpip!UdpTlProviderSendMessages+0x78
fffff880`03118160 fffff880`0406eff2 : 00000000`00000002 fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`0954ada8 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`03118240 fffff880`040981a8 : fffffa80`07e6ff70 00000000`000006f8 fffffa80`06e9f5f0 fffffa80`07e6ff70 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`03118270 fffffa80`07e6ff70 : 00000000`000006f8 fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`04b88900 : aswTdi+0x11a8
fffff880`03118278 00000000`000006f8 : fffffa80`06e9f5f0 fffffa80`07e6ff70 fffffa80`04b88900 fffffa80`04548900 : 0xfffffa80`07e6ff70
fffff880`03118280 fffffa80`06e9f5f0 : fffffa80`07e6ff70 fffffa80`04b88900 fffffa80`04548900 ffff0089`c0a80105 : 0x6f8
fffff880`03118288 fffffa80`07e6ff70 : fffffa80`04b88900 fffffa80`04548900 ffff0089`c0a80105 ffff0000`071ba107 : 0xfffffa80`06e9f5f0
fffff880`03118290 fffffa80`04b88900 : fffffa80`04548900 ffff0089`c0a80105 ffff0000`071ba107 00000000`0000003e : 0xfffffa80`07e6ff70
fffff880`03118298 fffffa80`04548900 : ffff0089`c0a80105 ffff0000`071ba107 00000000`0000003e fffffa80`06e23f20 : 0xfffffa80`04b88900
fffff880`031182a0 ffff0089`c0a80105 : ffff0000`071ba107 00000000`0000003e fffffa80`06e23f20 fffffa80`06e9f5f0 : 0xfffffa80`04548900
fffff880`031182a8 ffff0000`071ba107 : 00000000`0000003e fffffa80`06e23f20 fffffa80`06e9f5f0 fffffa80`07e6fe10 : 0xffff0089`c0a80105
fffff880`031182b0 00000000`0000003e : fffffa80`06e23f20 fffffa80`06e9f5f0 fffffa80`07e6fe10 fffffa80`06ea1930 : 0xffff0000`071ba107
fffff880`031182b8 fffffa80`06e23f20 : fffffa80`06e9f5f0 fffffa80`07e6fe10 fffffa80`06ea1930 fffff880`04098647 : 0x3e
fffff880`031182c0 fffffa80`06e9f5f0 : fffffa80`07e6fe10 fffffa80`06ea1930 fffff880`04098647 fffff880`031183b0 : 0xfffffa80`06e23f20
fffff880`031182c8 fffffa80`07e6fe10 : fffffa80`06ea1930 fffff880`04098647 fffff880`031183b0 fffff880`040a971a : 0xfffffa80`06e9f5f0
fffff880`031182d0 fffffa80`06ea1930 : fffff880`04098647 fffff880`031183b0 fffff880`040a971a fffffa80`06ea17e0 : 0xfffffa80`07e6fe10
fffff880`031182d8 fffff880`04098647 : fffff880`031183b0 fffff880`040a971a fffffa80`06ea17e0 00000000`00000000 : 0xfffffa80`06ea1930
fffff880`031182e0 fffff880`031183b0 : fffff880`040a971a fffffa80`06ea17e0 00000000`00000000 fffffa80`06e23f20 : aswTdi+0x1647
fffff880`031182e8 fffff880`040a971a : fffffa80`06ea17e0 00000000`00000000 fffffa80`06e23f20 fffffa80`088bb200 : 0xfffff880`031183b0
fffff880`031182f0 fffff880`040a9542 : 00000000`00000000 fffff880`031183d0 fffffa80`088bb200 fffffa80`07e6fe10 : netbt!GetIrp+0x52
fffff880`03118320 fffff880`040a9f61 : fffffa80`0954ada8 fffffa80`0954ada8 fffffa80`0939ac00 fffff880`03118420 : netbt!TdiSendDatagram+0x187
fffff880`03118390 fffff880`040b6329 : fffffa80`06e10b80 fffffa80`0954abf0 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
fffff880`03118420 fffff880`040b60e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`040d0089 : netbt!UdpSendResponse+0x4e0
fffff880`031184a0 fffff880`040aabe7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`031185d0 fffff880`040a8b47 : 00000000`00000032 fffff880`069d50d0 00000000`00000032 fffff880`03118802 : netbt!NameSrvHndlrNotOs+0xca
fffff880`03118610 fffff880`0409d443 : fffffa80`09c0d4e0 00000000`00000032 fffff880`040a2820 fffffa80`09c0d4e0 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`031186b0 fffffa80`09c0d4e0 : 00000000`00000032 fffff880`040a2820 fffffa80`09c0d4e0 00000000`00000000 : aswTdi+0x6443
fffff880`031186b8 00000000`00000032 : fffff880`040a2820 fffffa80`09c0d4e0 00000000`00000000 00000000`00000004 : 0xfffffa80`09c0d4e0
fffff880`031186c0 fffff880`040a2820 : fffffa80`09c0d4e0 00000000`00000000 00000000`00000004 00000000`00000032 : 0x32
fffff880`031186c8 fffffa80`09c0d4e0 : 00000000`00000000 00000000`00000004 00000000`00000032 00000000`00000032 : aswTdi+0xb820
fffff880`031186d0 00000000`00000000 : 00000000`00000004 00000000`00000032 00000000`00000032 fffff880`031187f8 : 0xfffffa80`09c0d4e0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!CompareSecurityContexts+6a
fffff880`01606c5a 448b442470      mov     r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------
 


Attachments

Old drivers may cause more BSODs

Update any of your Old Conexant device driver
Upgrade any software belonging to SafeNet - The Foundation of Information Security

Remove Adobe Air and Virtual Clone(elby CloneDVD?)
Code:
mdmxsdk.sys        fffff880`029f7000    206459d6`029fb280    0x2064615600004280    0x449716be    20/06/2006 01:27:26
aksdf.sys        fffff880`067ef000    fffff300`067fee00    0xfffffa800000fe00    0x458033cc    13/12/2006 21:09:32                
adfs.SYS        fffff880`067d7000    fffff880`067ef000    0x00018000    0x48640195    27/06/2008 00:52:37
 


Back
Top