I have actually tried the repair install but the problem remains. The following is a minidump file created at the time of the reboot.
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but …
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: 80000004, The exception code that was not handled
Arg2: 804ddb15, The address that the exception occurred at
Arg3: f65a57c0, Trap Frame
Arg4: 00000000
Debugging Details:
ANALYSIS: Kernel with unknown size. Will force reload symbols with known size.
ANALYSIS: Force reload command: .reload /f ntoskrnl.exe=FFFFFFFF804D5000,1F2700,3D6DE35C
ANALYSIS: kernel symbols have been forced reloaded due to unknown size.
EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - No such interface supported
FAULTING_IP:
nt!Dr_kite_a+16
804ddb15 0f21c3 mov ebx,dr0
TRAP_FRAME: f65a57c0 – (.trap fffffffff65a57c0)
ErrCode = 00000000
eax=00000023 ebx=f65a5b3c ecx=0006fbd0 edx=7ffe0304 esi=7ffde000 edi=00030000
eip=804ddb15 esp=f65a5834 ebp=f65a5834 iopl=0 nv up di pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000002
nt!Dr_kite_a+0x16:
804ddb15 0f21c3 mov ebx,dr0
Resetting default scope
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: ctfmon.exe
LAST_CONTROL_TRANSFER: from bf879588 to 804ddb15
STACK_TEXT:
f65a5834 bf879588 bf839997 0006f8e0 804db140 nt!Dr_kite_a+0x16
WARNING: Stack unwind information not available. Following frames may be wrong.
f65a5854 e12ea1f0 00360036 e1353630 00000000 win32k+0x79588
f65a5858 00360036 e1353630 00000000 00000023 0xe12ea1f0
f65a585c e1353630 00000000 00000023 00000023 0x360036
f65a5860 00000000 00000023 00000023 7ffe0304 0xe1353630
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k+79588
bf879588 ?? ???
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3d6de5e5
SYMBOL_NAME: win32k+79588
FAILURE_BUCKET_ID: 0x8E_win32k+79588
BUCKET_ID: 0x8E_win32k+79588
Followup: MachineOwner