Multiple BSOD Problems!


  1. Posts : 2
    Windows 7 Ultimate 32bit
       #1

    Multiple BSOD Problems!


    Hi!

    I Recently installed windows 7 onto my harddrive, installed all the necessary drivers/updates but i keep getting different BSOD. I've run through 3 runs of memtest without an error, the bsod's usually happens when im playing World of Warcraft or Counter-Strike and using ventrilo at the same time!

    I would appreciate if you gave my files a lookthrough =)



    Thx!
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    Hi, Zebbztar, and welcome to the forum.
    Bucheck F7 (2X), DRIVER_OVERRAN_STACK_BUFFER. Usual causes: Device driver, Malware.

    Bugcheck FC, ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY. Usual causes: Device driver.
    Because of two dumps with bugcheck F7, I recommend that you download, install and update Malware bytes. Run a scan of your system. Let's make sure you do not have a nasty on your system. Post back with your results.

    Uninstall Eset NOD32 using this removal tool: Tool. Your version is known to cause BSOD's on some Win 7 systems. Download and install Microsoft Security Essentials in its place. After you get your system stable you can try Eset again; but install the 2010 version, not your current version.

    Update the following driver through the link provided. It is out of date.
    nvm62x32.sys Fri Oct 17 17:00:39 2008 - nVidia Ethernet Networking Driver (nForce chipset driver). Drivers - Download NVIDIA Drivers.
    Follow these suggestions and see how your system runs. Plese update us and let us know. If you get another BSOD, upload it and we will go from there.
    Code:
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x8284e000 PsLoadedModuleList = 0x82996810
    Debug session time: Sun Jan 16 14:34:02.613 2011 (GMT-5)
    System Uptime: 0 days 2:49:46.532
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck F7, {293f6a19, 293f6a19, d6c095e6, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!KiDeferredReadyThread+8f2 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_OVERRAN_STACK_BUFFER (f7)
    A driver has overrun a stack-based buffer.  This overrun could potentially
    allow a malicious user to gain control of this machine.
    DESCRIPTION
    A driver overran a stack-based buffer (or local variable) in a way that would
    have overwritten the function's return address and jumped back to an arbitrary
    address when the function returned.  This is the classic "buffer overrun"
    hacking attack and the system has been brought down to prevent a malicious user
    from gaining complete control of it.
    Do a kb to get a stack backtrace -- the last routine on the stack before the
    buffer overrun handlers and bugcheck call is the one that overran its local
    variable(s).
    Arguments:
    Arg1: 293f6a19, Actual security check cookie from the stack
    Arg2: 293f6a19, Expected security check cookie
    Arg3: d6c095e6, Complement of the expected security check cookie
    Arg4: 00000000, zero
    
    Debugging Details:
    ------------------
    
    
    FAULTING_IP: 
    nt!KiDeferredReadyThread+8f2
    828bab89 8be5            mov     esp,ebp
    
    SECURITY_COOKIE:  Expected 293f6a19 found 293f6a19
    
    BUGCHECK_STR:  0xF7_ONE_BIT
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  Steam.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 8291c999 to 8292ad10
    
    STACK_TEXT:  
    9cc83ba4 8291c999 000000f7 293f6a19 293f6a19 nt!KeBugCheckEx+0x1e
    9cc83bc4 828bab89 86faa93c 00c83b00 00000000 nt!__report_gsfailure+0x24
    9cc83c34 828bb5a9 c61e8d48 00000000 c61e8d48 nt!KiDeferredReadyThread+0x8f2
    9cc83c50 828bb567 00000000 807c5120 807c5120 nt!KiReadyThread+0x30
    9cc83c68 828b57b1 00000001 00000001 00000000 nt!KiProcessThreadWaitList+0x3f
    9cc83ca4 828b5777 807c5120 00000000 00000001 nt!KiExitDispatcher+0x2a
    9cc83cdc 82a84056 87551168 00000001 00000000 nt!KeSetEvent+0xb2
    9cc83d24 8289142a 00000350 00000000 0012db4c nt!NtSetEvent+0x6f
    9cc83d24 776c64f4 00000350 00000000 0012db4c nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012db4c 00000000 00000000 00000000 00000000 0x776c64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDeferredReadyThread+8f2
    828bab89 8be5            mov     esp,ebp
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiDeferredReadyThread+8f2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    FAILURE_BUCKET_ID:  0xF7_ONE_BIT_nt!KiDeferredReadyThread+8f2
    
    BUCKET_ID:  0xF7_ONE_BIT_nt!KiDeferredReadyThread+8f2
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Sun Jan 16 15:27:24.221 2011 (GMT-5)
    System Uptime: 0 days 0:26:44.141
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck F7, {293a507e, 293a507e, d6c5af81, 0}
    
    Probably caused by : mouclass.sys ( mouclass!MouseClassServiceCallback+2fa )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_OVERRAN_STACK_BUFFER (f7)
    A driver has overrun a stack-based buffer.  This overrun could potentially
    allow a malicious user to gain control of this machine.
    DESCRIPTION
    A driver overran a stack-based buffer (or local variable) in a way that would
    have overwritten the function's return address and jumped back to an arbitrary
    address when the function returned.  This is the classic "buffer overrun"
    hacking attack and the system has been brought down to prevent a malicious user
    from gaining complete control of it.
    Do a kb to get a stack backtrace -- the last routine on the stack before the
    buffer overrun handlers and bugcheck call is the one that overran its local
    variable(s).
    Arguments:
    Arg1: 293a507e, Actual security check cookie from the stack
    Arg2: 293a507e, Expected security check cookie
    Arg3: d6c5af81, Complement of the expected security check cookie
    Arg4: 00000000, zero
    
    Debugging Details:
    ------------------
    
    
    FAULTING_IP: 
    nt!KiDeferredReadyThread+8f2
    828bdb89 8be5            mov     esp,ebp
    
    SECURITY_COOKIE:  Expected 293a507e found 293a507e
    
    BUGCHECK_STR:  0xF7_ONE_BIT
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  msnmsgr.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 8291f999 to 8292dd10
    
    STACK_TEXT:  
    807e5bdc 8291f999 000000f7 293a507e 293a507e nt!KeBugCheckEx+0x1e
    807e5bfc 828bdb89 00000005 000f3088 00000000 nt!__report_gsfailure+0x24
    807e5c6c 828be5a9 86f50b58 00000000 86f50b58 nt!KiDeferredReadyThread+0x8f2
    807e5c88 828be567 00000000 807c5120 86f50bb8 nt!KiReadyThread+0x30
    807e5ca0 828b87b1 00000006 00000001 86f50b58 nt!KiProcessThreadWaitList+0x3f
    807e5cdc 8290b967 807c5120 00000000 00000001 nt!KiExitDispatcher+0x2a
    807e5d18 828b9dff 84d6ae40 85f8de78 00000000 nt!KeInsertQueueApc+0xb9
    807e5d64 8e3275e0 86f0f0d8 86f605a8 00000000 nt!IopfCompleteRequest+0x3f4
    807e5d88 81f68664 000000f0 86f0f1c0 00000018 mouclass!MouseClassServiceCallback+0x2fa
    807e5dbc 828b9b33 00000000 02000000 01f0f0d8 mouhid!MouHid_ReadComplete+0x53a
    807e5e04 81f4f424 807e5e0c 807e5e0c 8661e6a0 nt!IopfCompleteRequest+0x128
    807e5e20 81f4f5df 0261e688 86f38e00 00000009 HIDCLASS!HidpDistributeInterruptReport+0xce
    807e5e5c 828b9b33 00000000 865d4428 86f5a49c HIDCLASS!HidpInterruptReadComplete+0x1a7
    807e5ea0 8e340868 82891334 84da96f0 00000000 nt!IopfCompleteRequest+0x128
    807e5ed0 8e341178 87404660 865d4428 84938640 USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x6e0
    807e5efc 8e3449af 85f53028 85f530f0 85f53a98 USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x33b
    807e5f24 8e33ed18 85f53028 85f53a98 85f53002 USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xbc
    807e5f48 828b93b5 85f53aa4 85f53002 00000000 USBPORT!USBPORT_Xdpc_Worker+0x173
    807e5fa4 828b9218 807c5120 87245cb0 00000000 nt!KiExecuteAllDpcs+0xf9
    807e5ff4 828b89dc 8cfdec60 00000000 00000000 nt!KiRetireDpcList+0xd5
    807e5ff8 8cfdec60 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    828b89dc 00000000 0000001a 00d6850f bb830000 0x8cfdec60
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    mouclass!MouseClassServiceCallback+2fa
    8e3275e0 6a18            push    18h
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  mouclass!MouseClassServiceCallback+2fa
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: mouclass
    
    IMAGE_NAME:  mouclass.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bbf13
    
    FAILURE_BUCKET_ID:  0xF7_ONE_BIT_mouclass!MouseClassServiceCallback+2fa
    
    BUCKET_ID:  0xF7_ONE_BIT_mouclass!MouseClassServiceCallback+2fa
    
    Followup: MachineOwner
    ---------
    
    Debug session time: Sun Jan 16 16:35:58.945 2011 (GMT-5)
    System Uptime: 0 days 0:09:54.661
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...............
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck FC, {90cd72aa, 27786101, a1d09914, 2}
    
    Probably caused by : win32k.sys ( win32k!EngCopyBits+604 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: 90cd72aa, Virtual address for the attempted execute.
    Arg2: 27786101, PTE contents.
    Arg3: a1d09914, (reserved)
    Arg4: 00000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'spsys' and 'spsys.sys' overlap
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    PROCESS_NAME:  egui.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  a1d09914 -- (.trap 0xffffffffa1d09914)
    ErrCode = 00000011
    eax=fbf62d6c ebx=fbf62d6c ecx=00000000 edx=00000000 esi=a1d09b24 edi=fceced6c
    eip=90cd72aa esp=a1d09988 ebp=a1d099a4 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    90cd72aa ff              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8287f638 to 828be903
    
    STACK_TEXT:  
    a1d098fc 8287f638 00000008 90cd72aa 00000000 nt!MmAccessFault+0x106
    a1d098fc 90cd72aa 00000008 90cd72aa 00000000 nt!KiTrap0E+0xdc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    a1d099a4 92cd71ea 00000002 3333ee71 fe680728 0x90cd72aa
    a1d09be4 92d0cdd2 fbf1b010 fce87010 00000000 win32k!EngCopyBits+0x604
    a1d09ccc 92cf4fae ffbbd550 92e452f0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab
    a1d09d00 8287c44a c7010ce7 00000000 00000000 win32k!NtGdiBitBlt+0x2f
    a1d09d00 777f64f4 c7010ce7 00000000 00000000 nt!KiFastCallEntry+0x12a
    0012f8e8 00000000 00000000 00000000 00000000 0x777f64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!EngCopyBits+604
    92cd71ea c745fcfeffffff  mov     dword ptr [ebp-4],0FFFFFFFEh
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  win32k!EngCopyBits+604
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cbe5b31
    
    FAILURE_BUCKET_ID:  0xFC_win32k!EngCopyBits+604
    
    BUCKET_ID:  0xFC_win32k!EngCopyBits+604
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start    end        module name
    82fb6000 82ffe000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    8e083000 8e0dd000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8ff0a000 8ff1c000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    8d2d5000 8d2e7000   amdk8    amdk8.sys    Mon Jul 13 19:11:03 2009 (4A5BBF07)
    88765000 8876e000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    886cd000 886d6000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    886d6000 886f9000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    88bf1000 88bf8000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8d2a6000 8d2b4000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    82e42000 82e4a000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    915ac000 915c5000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    92ec0000 92ede000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
    887b3000 887d2000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
    82e8c000 82f37000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    88bae000 88bd3000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    82e4a000 82e8c000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    88972000 889cf000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    8fefd000 8ff0a000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    822b7000 822c4000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8d22a000 8d28e000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    8d28e000 8d2a6000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    8e1de000 8e1ea000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    88b9d000 88bae000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8229e000 822b7000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    822c4000 822ce000   dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
    822f3000 82304000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    822ce000 822f3000   dump_nvstor dump_nvstor.sys Wed May 20 02:44:09 2009 (4A13A6B9)
    8234d000 82357000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8fe0d000 8fec4000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    8fec4000 8fefd000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    91438000 91504000   eamon    eamon.sys    Tue Sep 29 06:51:42 2009 (4AC1E6BE)
    887d2000 887ef000   ehdrv    ehdrv.sys    Tue Sep 29 06:52:16 2009 (4AC1E6E0)
    8e1d5000 8e1de000   EIO      EIO.sys      Tue Jul 21 22:34:52 2009 (4A667ACC)
    9141b000 91435000   epfwwfpr epfwwfpr.sys Tue Sep 29 06:46:24 2009 (4AC1E580)
    887a2000 887b3000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    8876e000 887a2000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    889dd000 889e6000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
    88b6b000 88b9d000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
    88d4f000 88d80000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    82802000 82839000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8d387000 8d3a6000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    8221f000 8226f000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    82328000 8233b000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
    8233b000 82341480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
    8231d000 82328000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
    91527000 915ac000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    88b63000 88b6b000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8d2f1000 8d309000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    8d309000 8d316000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    80bb8000 80bc0000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8ffb3000 8ffe7000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8895f000 88972000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    88b2e000 88b53000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    91504000 91514000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    82362000 8237d000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    82e26000 82e31000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
    82357000 82362000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8d316000 8d323000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    82342000 8234d000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    886b7000 886cd000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    915c5000 915d7000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    915d7000 915fa000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    8237d000 823b8000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    91400000 9141b000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    8e048000 8e053000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
    82e09000 82e11000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    88934000 8895f000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
    8e1cb000 8e1d5000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    88b53000 88b63000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    88a39000 88af0000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8ff34000 8ff3f000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    8ff3f000 8ff61000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    8d200000 8d211000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8e135000 8e143000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    8e0dd000 8e10f000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    88af0000 88b2e000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    8e053000 8e061000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    8e1c1000 8e1cb000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    82839000 82c49000   nt       ntkrpamp.exe Fri Jun 18 23:55:24 2010 (4C1C3FAC)
    88805000 88934000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    88bea000 88bf1000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
    91fac000 91fad040   nvBridge nvBridge.kmd Sat Oct 16 13:04:23 2010 (4CB9DB17)
    9160f000 91fab5a0   nvlddmkm nvlddmkm.sys Sat Oct 16 13:07:56 2010 (4CB9DBEC)
    8d3a6000 8d3fac80   nvm62x32 nvm62x32.sys Fri Oct 17 17:00:39 2008 (48F8FCF7)
    886f9000 8871e000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
    8e116000 8e135000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    88636000 88647000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    88601000 8862b000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    886a2000 886a9000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
    886a9000 886b7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    889cf000 889dd000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    9602e000 960c5000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8226f000 8229e000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    82e31000 82e42000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8ff1c000 8ff34000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8ff61000 8ff79000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8ff79000 8ff90000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8ff90000 8ffa7000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8e180000 8e1c1000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8ffa7000 8ffb1000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    8e030000 8e038000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    8e038000 8e040000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    8e040000 8e048000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    88dd0000 88dfd000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    91514000 91527000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    960c5000 960cf000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    8d2e7000 8d2f1000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
    8e143000 8e15d000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
    88dc8000 88dd0000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    9ae21000 9ae8b000   spsys    spsys.sys    Mon May 11 12:37:10 2009 (4A085436)
    9614c000 9619d000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
    960fd000 9614c000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
    960cf000 960f0000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
    8871e000 88765000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
    8ffb1000 8ffb2380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    88c06000 88d4f000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    960f0000 960fd000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8e078000 8e083000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    8e061000 8e078000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    8e170000 8e180000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    92e90000 92e99000   TSDDD    TSDDD.dll    unavailable (00000000)
    8d2b4000 8d2d5000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    8ffe7000 8fff5000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    82304000 8231b000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    8231b000 8231c700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8d378000 8d387000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    91fae000 91ff2000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    8d323000 8d32d000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8d32d000 8d378000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8862b000 88636000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    889e6000 889f2000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    8e002000 8e023000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    88d80000 88d88380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    88647000 88657000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    88657000 886a2000   volmgrx  volmgrx.sys  unavailable (00000000)
    88d89000 88dc8000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8e15d000 8e170000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    8e023000 8e030000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    82f37000 82fa8000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    82fa8000 82fb6000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    8e10f000 8e116000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    92c30000 92e7b000   win32k   win32k.sys   Tue Oct 19 23:00:01 2010 (4CBE5B31)
    82e00000 82e09000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    
    Unloaded modules:
    9ae2b000 9ae95000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    9141b000 91433000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    88bd3000 88be0000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    88be0000 88bea000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    88a00000 88a25000   dump_nvstor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    88a25000 88a36000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  3. Posts : 2
    Windows 7 Ultimate 32bit
    Thread Starter
       #3

    Still got probs


    Did as you said, and Malwarebytes didnīt find anything and when i used Microsoft Security Essentials i got another bluescreen while i was performing a scan.

    Here is the latest .dmp file
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Đ Designer Media Ltd
All times are GMT -5. The time now is 18:47.
Find Us