Again---help!!!


  1. Posts : 8
    Microsoft Windows 7 Ultimate Edition (build 7600), 32-bit
       #1

    Again---help!!!


    OK i ve did exactly what did you told me, but now i have a problem with my explorer.
    Every time i want to run a program in administrator (right click on the mouse and run as administrator) it says explorer stoped working, and then it sayt that is going to run it again.
    Thanks for previous post!
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    BugCheck 1000008E, {c0000005, e285de85, d6551b60, 0}
    Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )

    BugCheck 1000007E, {c0000005, e2ad82f1, cb91b814, cb91b3f0}
    Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )

    BugCheck 1000007E, {c0000005, e2b0e2f1, cb91f814, cb91f3f0}
    Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )

    CRITICAL_OBJECT_TERMINATION (f4)
    0xF4_C0000005_IMAGE_wininit.exe




    Hmmm .... why don't you do as follows:



    1. Uninstall Eset, cause it won't work well when side by side with Microsoft Security Essentials:

    ehdrv.sys Thu May 14 16:31:56 2009
    MpFilter.sys Sat Mar 20 06:03:26 2010



    2. Uninstall sptd.sys:

    sptd.sys Sun Oct 11 23:54:02 2009
    Daemon/Alcohol/Duplex Secure
    ( http://www.duplexsecure.com/en/faq )
    Later if your system is stable you can update it to the latest 2010 version. But for now remove.


    3. Update:

    WmBEnum.sys Wed Apr 13 05:21:27 2005
    WmXlCore.sys Wed Apr 13 05:21:25 2005
    Logitech WingMan

    L1E62x86.sys Thu Jun 11 09:39:12 2009
    Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller



    4. Be sure to follow all steps otlined above. If crashes persist, attach your LATEST .dmp files so we can see your progress and so we can advise you what to do next.



    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\091810-29343-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe281f000 PsLoadedModuleList = 0xe2967810
    Debug session time: Sat Sep 18 16:27:36.974 2010 (GMT-5)
    System Uptime: 0 days 5:18:56.550
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, e285de85, d6551b60, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: e285de85, The address that the exception occurred at
    Arg3: d6551b60, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!memset+45
    e285de85 f3ab            rep stos dword ptr es:[edi]
    
    TRAP_FRAME:  d6551b60 -- (.trap 0xffffffffd6551b60)
    ErrCode = 00000002
    eax=00000000 ebx=00000000 ecx=00000040 edx=00000000 esi=c4b00188 edi=00000000
    eip=e285de85 esp=d6551bd4 ebp=d6551bfc iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!memset+0x45:
    e285de85 f3ab            rep stos dword ptr es:[edi]
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  PnkBstrB.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from e285b4bc to e285de85
    
    STACK_TEXT:  
    d6551bfc e285b4bc c4b00188 c533a598 c533a598 nt!memset+0x45
    d6551c14 e2a5cf6e c528b8c0 c533a598 c533a608 nt!IofCallDriver+0x63
    d6551c34 e2a79d5f c4b00188 c528b8c0 00000000 nt!IopSynchronousServiceTail+0x1f8
    d6551cd0 e2a7c53a c4b00188 c533a598 00000000 nt!IopXxxControlFile+0x6aa
    d6551d04 e286244a 00000118 00000114 00000000 nt!NtDeviceIoControlFile+0x2a
    d6551d04 777f64f4 00000118 00000114 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0096eb90 00000000 00000000 00000000 00000000 0x777f64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!IofCallDriver+63
    e285b4bc 5e              pop     esi
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!IofCallDriver+63
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    FAILURE_BUCKET_ID:  0x8E_nt!IofCallDriver+63
    
    BUCKET_ID:  0x8E_nt!IofCallDriver+63
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100810-27861-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe2a1d000 PsLoadedModuleList = 0xe2b65810
    Debug session time: Fri Oct  8 22:03:47.111 2010 (GMT-5)
    System Uptime: 0 days 4:56:57.812
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ...................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, e2ad82f1, cb91b814, cb91b3f0}
    
    Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: e2ad82f1, The address that the exception occurred at
    Arg3: cb91b814, Exception Record Address
    Arg4: cb91b3f0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!RtlImageNtHeaderEx+4a
    e2ad82f1 663902          cmp     word ptr [edx],ax
    
    EXCEPTION_RECORD:  cb91b814 -- (.exr 0xffffffffcb91b814)
    ExceptionAddress: e2ad82f1 (nt!RtlImageNtHeaderEx+0x0000004a)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 7fff0000
    Attempt to read from address 7fff0000
    
    CONTEXT:  cb91b3f0 -- (.cxr 0xffffffffcb91b3f0)
    eax=00005a4d ebx=00000000 ecx=00000500 edx=7fff0000 esi=7fff0000 edi=cb91b8f0
    eip=e2ad82f1 esp=cb91b8dc ebp=cb91b8dc iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!RtlImageNtHeaderEx+0x4a:
    e2ad82f1 663902          cmp     word ptr [edx],ax        ds:0023:7fff0000=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  uTorrent.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  7fff0000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from e2b85718
    Unable to read MiSystemVaType memory at e2b65160
     7fff0000 
    
    FOLLOWUP_IP: 
    nt!RtlImageNtHeaderEx+4a
    e2ad82f1 663902          cmp     word ptr [edx],ax
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from e2adc394 to e2ad82f1
    
    STACK_TEXT:  
    cb91b8dc e2adc394 00000000 00000000 ed01c3ef nt!RtlImageNtHeaderEx+0x4a
    cb91b964 e2a5ddad 00000008 00000286 ed08b4d3 nt!RtlImageNtHeader+0x1a
    cb91b968 00000000 00000286 ed08b4d3 80000840 nt!ZwClose+0x11
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!RtlImageNtHeaderEx+4a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    STACK_COMMAND:  .cxr 0xffffffffcb91b3f0 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!RtlImageNtHeaderEx+4a
    
    BUCKET_ID:  0x7E_nt!RtlImageNtHeaderEx+4a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\100910-22729-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe2a53000 PsLoadedModuleList = 0xe2b9b810
    Debug session time: Sat Oct  9 22:04:37.481 2010 (GMT-5)
    System Uptime: 0 days 23:59:46.182
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................
    Loading User Symbols
    Loading unloaded module list
    ...........................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, e2b0e2f1, cb91f814, cb91f3f0}
    
    Probably caused by : ntkrpamp.exe ( nt!RtlImageNtHeaderEx+4a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: e2b0e2f1, The address that the exception occurred at
    Arg3: cb91f814, Exception Record Address
    Arg4: cb91f3f0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!RtlImageNtHeaderEx+4a
    e2b0e2f1 663902          cmp     word ptr [edx],ax
    
    EXCEPTION_RECORD:  cb91f814 -- (.exr 0xffffffffcb91f814)
    ExceptionAddress: e2b0e2f1 (nt!RtlImageNtHeaderEx+0x0000004a)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 7fff0000
    Attempt to read from address 7fff0000
    
    CONTEXT:  cb91f3f0 -- (.cxr 0xffffffffcb91f3f0)
    eax=00005a4d ebx=00000000 ecx=00000500 edx=7fff0000 esi=7fff0000 edi=cb91f8f0
    eip=e2b0e2f1 esp=cb91f8dc ebp=cb91f8dc iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!RtlImageNtHeaderEx+0x4a:
    e2b0e2f1 663902          cmp     word ptr [edx],ax        ds:0023:7fff0000=????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  uTorrent.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  7fff0000
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from e2bbb718
    Unable to read MiSystemVaType memory at e2b9b160
     7fff0000 
    
    FOLLOWUP_IP: 
    nt!RtlImageNtHeaderEx+4a
    e2b0e2f1 663902          cmp     word ptr [edx],ax
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from e2b12394 to e2b0e2f1
    
    STACK_TEXT:  
    cb91f8dc e2b12394 00000000 00000000 ed01c3ef nt!RtlImageNtHeaderEx+0x4a
    cb91f964 e2a93dad 00000008 00000286 c350a4d3 nt!RtlImageNtHeader+0x1a
    cb91f968 00000000 00000286 c350a4d3 80000fb4 nt!ZwClose+0x11
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!RtlImageNtHeaderEx+4a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    STACK_COMMAND:  .cxr 0xffffffffcb91f3f0 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!RtlImageNtHeaderEx+4a
    
    BUCKET_ID:  0x7E_nt!RtlImageNtHeaderEx+4a
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101510-31543-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe2a47000 PsLoadedModuleList = 0xe2b8f810
    Debug session time: Fri Oct 15 16:44:20.273 2010 (GMT-5)
    System Uptime: 0 days 0:00:15.974
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....
    Loading User Symbols
    Loading unloaded module list
    ........
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CRITICAL_OBJECT_TERMINATION (f4)
    A process or thread crucial to system operation has unexpectedly exited or been
    terminated.
    Several processes and threads are necessary for the operation of the
    system; when they are terminated (for any reason), the system can no
    longer function.
    Arguments:
    Arg1: 00000003, Process
    Arg2: c4a33318, Terminating object
    Arg3: c4a33484, Process image file name
    Arg4: e2c6fdd0, Explanatory message (ascii)
    
    Debugging Details:
    ------------------
    
    
    PROCESS_OBJECT: c4a33318
    
    IMAGE_NAME:  wininit.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: wininit
    
    FAULTING_MODULE: 00000000 
    
    PROCESS_NAME:  wininit.exe
    
    EXCEPTION_RECORD:  cb8e3ce0 -- (.exr 0xffffffffcb8e3ce0)
    ExceptionAddress: 77326c32
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000001
       Parameter[1]: 00130ff8
    Attempt to write to address 00130ff8
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000001
    
    EXCEPTION_PARAMETER2:  00130ff8
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from e2baf718
    Unable to read MiSystemVaType memory at e2b8f160
     00130ff8 
    
    FOLLOWUP_IP: 
    +0
    77326c32 ??              ???
    
    FAULTING_IP: 
    +0
    77326c32 ??              ???
    
    FAILED_INSTRUCTION_ADDRESS: 
    +0
    77326c32 ??              ???
    
    BUGCHECK_STR:  0xF4_C0000005
    
    STACK_TEXT:  
    cb8e37a8 e2d230d7 000000f4 00000003 c4a33318 nt!KeBugCheckEx+0x1e
    cb8e37cc e2ca6ed2 e2c6fdd0 c4a33484 c4a33588 nt!PspCatchCriticalBreak+0x71
    cb8e37fc e2ca8d6f c4a33318 c4a32d48 c0000005 nt!PspTerminateAllThreads+0x2d
    cb8e3830 e2a8a44a ffffffff c0000005 cb8e3cc4 nt!NtTerminateProcess+0x1a2
    cb8e3830 e2a896ad ffffffff c0000005 cb8e3cc4 nt!KiFastCallEntry+0x12a
    cb8e38b0 e2b0466f ffffffff c0000005 0001003f nt!ZwTerminateProcess+0x11
    cb8e3cc4 e2a8b036 cb8e3ce0 00000000 cb8e3d34 nt!KiDispatchException+0x497
    cb8e3d2c e2a8afea 0013102c 77326c32 badb0d00 nt!CommonDispatchException+0x4a
    cb8e3d34 77326c32 badb0d00 773264f4 00000000 nt!Kei386EoiHelper+0x192
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    cb8e3d38 badb0d00 773264f4 00000000 00000000 0x77326c32
    cb8e3d3c 773264f4 00000000 00000000 00000000 0xbadb0d00
    cb8e3d40 00000000 00000000 00000000 00000000 0x773264f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_NAME:  MachineOwner
    
    FAILURE_BUCKET_ID:  0xF4_C0000005_IMAGE_wininit.exe
    
    BUCKET_ID:  0xF4_C0000005_IMAGE_wininit.exe
    
    Followup: MachineOwner
    
    c9200000 c921d000   ehdrv    ehdrv.sys    Thu May 14 16:31:56 2009 (4A0C1D4C)
    c9234000 c92ac000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
    c92ac000 c92bd000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    c92bd000 c92c5000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    c92c5000 c9307000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    c9307000 c93b2000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    c93b2000 c93fa000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    c9400000 c942a000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    c9434000 c94a5000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    c94a5000 c94b3000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    c94b3000 c95a6000   sptd     sptd.sys     Sun Oct 11 23:54:02 2009 (4AD245EA)
    c95a6000 c95af000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    c95af000 c95d5000   SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
    c95d5000 c95dd000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    c95dd000 c95e8000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    c95e8000 c95f9000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    c9600000 c9623000   MpFilter MpFilter.sys Sat Mar 20 06:03:26 2010 (4BA4490E)
    c9626000 c96f9000   xyadrec  xyadrec.sys  Fri Oct 08 21:12:51 2010 (4CAF5F23)
    c96f9000 c9709000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    c9709000 c9754000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    c9754000 c975b000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
    c975b000 c9769000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    c9769000 c977f000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    c977f000 c9788000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    c9788000 c97ab000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    c97ab000 c97b4000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    c97b4000 c97e8000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    c97e8000 c97f9000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    c9816000 c9945000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    c9945000 c9970000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    c9970000 c9983000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    c9983000 c99e0000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    c99e0000 c99ee000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    c99ee000 c99f7000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    c9a00000 c9a0c000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    c9a0c000 c9ac3000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    c9ac3000 c9b01000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    c9b01000 c9b26000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
    c9b26000 c9b53000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    c9b53000 c9b85000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
    c9b85000 c9baa000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    c9bd1000 c9bf0000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    c9bf0000 c9bf7000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    c9bf7000 c9bfe000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    c9c00000 c9c10000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    c9c10000 c9c18000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    c9c18000 c9c29000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    c9c2a000 c9d73000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
    c9d73000 c9da4000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    c9da4000 c9dac380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    c9dad000 c9dec000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    c9dec000 c9df4000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    d040a000 d042b000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    d042b000 d0438000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    d0438000 d0440000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    d0440000 d0448000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    d0448000 d0450000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    d0450000 d045b000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    d045b000 d0469000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    d0469000 d0480000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    d0480000 d048b000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    d048b000 d04e5000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    d04e5000 d0517000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    d0517000 d051e000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    d051e000 d053d000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    d053d000 d054b000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    d054b000 d0565000   serial   serial.sys   Tue Jul 14 02:45:33 2009 (4A5BC71D)
    d0565000 d0578000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    d0578000 d0588000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    d0588000 d05c9000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    d05c9000 d05d1420   oreans32 oreans32.sys Tue Jul 11 10:05:03 2006 (44B34D9F)
    d05d2000 d05dc000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    d05dc000 d05e6000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    d05e6000 d05eb900   MpKsl49ada959 MpKsl49ada959.sys Wed Mar 31 05:06:14 2010 (4BB2AE16)
    d05ec000 d05f8000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    d0600000 d060d000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    d062a000 d068e000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    d068e000 d06a6000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    d06a6000 d06b4000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    d06b4000 d06d5000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    d06d5000 d06e7000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
    d06e7000 d06f6000   L1E62x86 L1E62x86.sys Thu Jun 11 09:39:12 2009 (4A30A690)
    d06f6000 d0701000   fdc      fdc.sys      Tue Jul 14 02:45:45 2009 (4A5BC729)
    d0701000 d073a000   a46uv0uu a46uv0uu.SYS Wed Jul 15 00:12:41 2009 (4A5CF4C9)
    d073a000 d0747000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    d0747000 d0759000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    d0759000 d0771000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    d0771000 d077c000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    d077c000 d079e000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    d079e000 d07b6000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    d07b6000 d07cd000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    d07cd000 d07e4000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    d07e4000 d07ee000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    d07ee000 d07fb000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    d0a00000 d0a11000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    d0a1b000 d0a4f000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
    d0a4f000 d0a517a0   WmBEnum  WmBEnum.sys  Wed Apr 13 05:21:27 2005 (425C8227)
    d0a52000 d0a5d1c0   WmXlCore WmXlCore.sys Wed Apr 13 05:21:25 2005 (425C8225)
    d0a5e000 d0a6c000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    d0a6c000 d0ab0000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    d0ab0000 d0aba000   flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
    d0aba000 d0acb000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    d0acb000 d0b1b000   HdAudio  HdAudio.sys  Tue Jul 14 02:51:46 2009 (4A5BC892)
    d0b1b000 d0b4a000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    d0b4a000 d0b63000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    d0b63000 d0b6d000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    d0b6d000 d0b84000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    d0b84000 d0b85700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    d0b86000 d0b91000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
    d0b91000 d0ba4000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
    d0ba4000 d0baa480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
    d0bab000 d0bc1000   cdfs     cdfs.sys     Tue Jul 14 02:11:14 2009 (4A5BBF12)
    d0bc1000 d0bcc000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    d0bcc000 d0bd7000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    d0bd7000 d0be4000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    d0be4000 d0bef000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
    d0bef000 d0bf8000   dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    d1c00000 d1c0f000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    d1c0f000 d1c2e000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    d1c2e000 d1c38000   serenum  serenum.sys  Tue Jul 14 02:45:27 2009 (4A5BC717)
    d1c38000 d26b5dc0   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162)
    d26b6000 d26b7040   nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033)
    d26b8000 d276f000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
    d276f000 d27a8000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    d27a8000 d27b3000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
    d27b3000 d27fe000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    d27fe000 d27ff380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    d3ed0000 d411a000   win32k   win32k.sys   Sat Jun 19 07:06:50 2010 (4C1C425A)
    d4130000 d4139000   TSDDD    TSDDD.dll    Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    d4160000 d417e000   cdd      cdd.dll      unavailable (00000000)
    e0bcf000 e0bd7000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    e2a10000 e2a47000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    e2a47000 e2e57000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
    
    Unloaded modules:
    c9baa000 c9bb7000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9df4000 c9dff000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9bb7000 c9bc0000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9bc0000 c9bd1000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9bec000 c9bf5000   ujihpmok.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9be3000 c9bec000   tcpmqkci.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9bda000 c9be3000   swqqbqql.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9bd1000 c9bda000   qhmfjnjx.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


 

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 13:56.
Find Us