New
#1
BSOP report-problem
I ve add Windows_NT6_BSOD_jcgriff2 folder in a rar, because i could upload it.
I ve add Windows_NT6_BSOD_jcgriff2 folder in a rar, because i could upload it.
One of your crashes was caused by xyadrec.sys Fri Oct 08 21:12:51 2010, I cannot find anything on this file and if you can't either then scan your system for malware.
You have Eset Smart Security:
ehdrv.sys Thu May 14 16:31:56 2009
eamon.sys Thu May 14 16:30:44 2009
Replace it with the latest Eset version (2010), OR install Microsoft Security Essentials instead:
http://www.microsoft.com/security_essentials/
ESET - Antivirus Software with Spyware and Malware Protection
Update:
WmHidLo.sys Wed Apr 13 05:21:31 2005
WmFilter.sys Wed Apr 13 05:21:30 2005
WmBEnum.sys Wed Apr 13 05:21:27 2005
WmXlCore.sys Wed Apr 13 05:21:25 2005
Logitech WingMan Software
sptd.sys Sun Oct 11 23:54:02 2009
Daemon/Alcohol/Duplex - uninstall it for now
L1E62x86.sys Thu Jun 11 09:39:12 2009
Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller
a9d4hlmb.SYS Wed Jul 15 00:12:41 2009
? some software, I can't find any info on this file
Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\a\Minidump\D M P\091810-29343-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.x86fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xe281f000 PsLoadedModuleList = 0xe2967810 Debug session time: Sat Sep 18 16:27:36.974 2010 (GMT-5) System Uptime: 0 days 5:18:56.550 Loading Kernel Symbols ............................................................... ................................................................ .................... Loading User Symbols Loading unloaded module list ............ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, e285de85, d6551b60, 0} Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: e285de85, The address that the exception occurred at Arg3: d6551b60, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: nt!memset+45 e285de85 f3ab rep stos dword ptr es:[edi] TRAP_FRAME: d6551b60 -- (.trap 0xffffffffd6551b60) ErrCode = 00000002 eax=00000000 ebx=00000000 ecx=00000040 edx=00000000 esi=c4b00188 edi=00000000 eip=e285de85 esp=d6551bd4 ebp=d6551bfc iopl=0 nv up ei pl nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202 nt!memset+0x45: e285de85 f3ab rep stos dword ptr es:[edi] Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: PnkBstrB.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from e285b4bc to e285de85 STACK_TEXT: d6551bfc e285b4bc c4b00188 c533a598 c533a598 nt!memset+0x45 d6551c14 e2a5cf6e c528b8c0 c533a598 c533a608 nt!IofCallDriver+0x63 d6551c34 e2a79d5f c4b00188 c528b8c0 00000000 nt!IopSynchronousServiceTail+0x1f8 d6551cd0 e2a7c53a c4b00188 c533a598 00000000 nt!IopXxxControlFile+0x6aa d6551d04 e286244a 00000118 00000114 00000000 nt!NtDeviceIoControlFile+0x2a d6551d04 777f64f4 00000118 00000114 00000000 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0096eb90 00000000 00000000 00000000 00000000 0x777f64f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!IofCallDriver+63 e285b4bc 5e pop esi SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!IofCallDriver+63 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac FAILURE_BUCKET_ID: 0x8E_nt!IofCallDriver+63 BUCKET_ID: 0x8E_nt!IofCallDriver+63 Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\a\Minidump\D M P\101410-24960-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.x86fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xe2a12000 PsLoadedModuleList = 0xe2b5a810 Debug session time: Thu Oct 14 17:56:53.045 2010 (GMT-5) System Uptime: 0 days 1:31:35.746 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list .......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {f3b79000, 2, 0, c9608ccb} Unable to load image \SystemRoot\System32\Drivers\xyadrec.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for xyadrec.sys *** ERROR: Module load completed but symbols could not be loaded for xyadrec.sys Unable to load image \SystemRoot\system32\DRIVERS\L1E62x86.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for L1E62x86.sys *** ERROR: Module load completed but symbols could not be loaded for L1E62x86.sys Probably caused by : xyadrec.sys ( xyadrec+4ccb ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: f3b79000, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, value 0 = read operation, 1 = write operation Arg4: c9608ccb, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from e2b7a718 Unable to read MiSystemVaType memory at e2b5a160 f3b79000 CURRENT_IRQL: 2 FAULTING_IP: xyadrec+4ccb c9608ccb 0fb618 movzx ebx,byte ptr [eax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: c91dbe94 -- (.trap 0xffffffffc91dbe94) ErrCode = 00000000 eax=f3b79000 ebx=00000040 ecx=f3b78fff edx=f3b78ffc esi=f3b78fff edi=f3b78a60 eip=c9608ccb esp=c91dbf08 ebp=c91dbf18 iopl=0 nv up ei ng nz na pe cy cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287 xyadrec+0x4ccb: c9608ccb 0fb618 movzx ebx,byte ptr [eax] ds:0023:f3b79000=?? Resetting default scope LAST_CONTROL_TRANSFER: from c9608ccb to e2a5882b STACK_TEXT: c91dbe94 c9608ccb badb0d00 f3b78ffc 000005a0 nt!KiTrap0E+0x2cf WARNING: Stack unwind information not available. Following frames may be wrong. c91dbf18 c962d7aa f3b79000 f3b78ffc c91dc048 xyadrec+0x4ccb c91dbf34 c97e4589 c91dc350 c91dc368 000005a0 xyadrec+0x297aa c91dbf8c c97e489c c91dc028 c36fd008 c36fd008 NETIO!StreamInvokeCalloutAndNormalizeAction+0xce c91dbfbc c97e49b7 c91dc028 c36fd008 c36fd008 NETIO!StreamCalloutProcessData+0x31 c91dbffc c97e4e1d c91dc028 c36fd008 c36fd008 NETIO!StreamCalloutProcessingLoop+0x55 c91dc068 c97d2f56 00000014 c96085a9 00000000 NETIO!StreamProcessCallout+0x128 c91dc0cc c97bd334 00000014 c91dc350 c91dc368 NETIO!ProcessCallout+0x120 c91dc140 c97bc25c 00000014 c91dc350 c91dc368 NETIO!ArbitrateAndEnforce+0xae c91dc250 c97e2332 00000014 c91dc350 c91dc368 NETIO!KfdClassify+0x1c7 c91dc2e4 c97e26fe 00000014 c91dc350 c91dc368 NETIO!StreamClassify+0xa0 c91dc4c4 c97e2b91 c4002bb0 00000014 c91dc4f0 NETIO!StreamCommonInspect+0x252 c91dc4f8 c9cd1d2d c4002bb0 00000000 c2c38ae0 NETIO!WfpStreamInspectReceive+0xb8 c91dc520 c9c99362 c2936760 c2936858 c2c38ae0 tcpip!TcpInspectReceive+0x55 c91dc570 c9c985a6 c2936760 c91dc594 c91dc5cc tcpip!TcpTcbFastDatagram+0x2fd c91dc5d8 c9c989ac c3621750 c2936760 001dc64c tcpip!TcpTcbReceive+0x142 c91dc640 c9c87b4c c35fb6e0 c361b000 00000000 tcpip!TcpMatchReceive+0x237 c91dc690 c9c878ae c3621750 c361b000 0000c0de tcpip!TcpPreValidatedReceive+0x293 c91dc6ac c9c8d273 c3621750 c361b000 c91dc6e8 tcpip!TcpReceive+0x2d c91dc6bc c9cbf50e c91dc6d0 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12 c91dc6e8 c9cbf2d1 c9d1ef88 c91dc73c c000023e tcpip!IppDeliverListToProtocol+0x49 c91dc708 c9cbefa6 c9d1ed98 00000006 c91dc73c tcpip!IppProcessDeliverList+0x2a c91dc760 c9cbcbe4 c9d1ed98 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1f2 c91dc7f4 c9cbbb75 c40b6428 00000000 c3fd8001 tcpip!IpFlcReceivePackets+0xbe5 c91dc870 c9cbbce6 c4571a88 c41207e8 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746 c91dc8a4 e2aa1faa c41207e8 e781d7b9 c3623128 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e c91dc90c c9cbbd6e c9cbbbc8 c91dc934 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132 c91dc948 c999418d c4571a02 c4120700 00000000 tcpip!FlReceiveNetBufferListChain+0x7c c91dc980 c9982670 c4571200 c41207e8 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188 c91dc9a8 c99825e7 00000000 c41207e8 c3fcc0e0 ndis!ndisIndicateSortedNetBufferLists+0x4a c91dcb24 c992dca5 c3fcc0e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129 c91dcb40 c9982a2e c3fcc0e0 c41207e8 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d c91dcb68 c992dc1e c3fcc0e0 c41207e8 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62 c91dcb90 cece79ea c3fcc0e0 c41207e8 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52 c91dcbe4 ceceb0eb 000c9000 c91dcc40 00000000 L1E62x86+0x59ea c91dcc04 cece34dc c40c9000 c91dcc40 c91dcc50 L1E62x86+0x90eb c91dcc14 c9982309 c40c9000 00000000 c91dcc40 L1E62x86+0x14dc c91dcc50 c992d9f4 c40813f4 000813e0 00000000 ndis!ndisMiniportDpc+0xe2 c91dcc78 e2a7a3b5 c40813f4 c40813e0 00000000 ndis!ndisInterruptDpc+0xaf c91dccd4 e2a7a218 c91c0120 c91c5800 00000000 nt!KiExecuteAllDpcs+0xf9 c91dcd20 e2a7a038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xd5 c91dcd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38 STACK_COMMAND: kb FOLLOWUP_IP: xyadrec+4ccb c9608ccb 0fb618 movzx ebx,byte ptr [eax] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: xyadrec+4ccb FOLLOWUP_NAME: MachineOwner MODULE_NAME: xyadrec IMAGE_NAME: xyadrec.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4caf5f23 FAILURE_BUCKET_ID: 0xD1_xyadrec+4ccb BUCKET_ID: 0xD1_xyadrec+4ccb Followup: MachineOwner --------- 1: kd> lmvm xyadrec start end module name c9604000 c96d7000 xyadrec T (no symbols) Loaded symbol image file: xyadrec.sys Image path: \SystemRoot\System32\Drivers\xyadrec.sys Image name: xyadrec.sys Timestamp: Fri Oct 08 21:12:51 2010 (4CAF5F23) CheckSum: 000CE4BD ImageSize: 000D3000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 1: kd> lmtn start end module name c920a000 c9282000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21) c9282000 c9293000 PSHED PSHED.dll Tue Jul 14 04:09:36 2009 (4A5BDAD0) c9293000 c929b000 BOOTVID BOOTVID.dll Tue Jul 14 04:04:34 2009 (4A5BD9A2) c929b000 c92dd000 CLFS CLFS.SYS Tue Jul 14 02:11:10 2009 (4A5BBF0E) c92dd000 c9388000 CI CI.dll Tue Jul 14 04:09:28 2009 (4A5BDAC8) c9388000 c93f9000 Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28) c941c000 c942a000 WDFLDR WDFLDR.SYS Tue Jul 14 02:11:25 2009 (4A5BBF1D) c942a000 c951d000 sptd sptd.sys Sun Oct 11 23:54:02 2009 (4AD245EA) c951d000 c9526000 WMILIB WMILIB.SYS Tue Jul 14 02:11:22 2009 (4A5BBF1A) c9526000 c954c000 SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733) c954c000 c9594000 ACPI ACPI.sys Tue Jul 14 02:11:11 2009 (4A5BBF0F) c9594000 c959c000 msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D) c959c000 c95a7000 vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B) c95a7000 c95d1000 pci pci.sys Tue Jul 14 02:11:16 2009 (4A5BBF14) c95d1000 c95e2000 partmgr partmgr.sys Tue Jul 14 02:11:35 2009 (4A5BBF27) c9604000 c96d7000 xyadrec xyadrec.sys Fri Oct 08 21:12:51 2010 (4CAF5F23) c96d7000 c9709000 netbt netbt.sys Tue Jul 14 02:12:18 2009 (4A5BBF52) c9709000 c9728000 pacer pacer.sys Tue Jul 14 02:53:58 2009 (4A5BC916) c9728000 c9738000 termdd termdd.sys Tue Jul 14 03:01:35 2009 (4A5BCADF) c9738000 c9779000 rdbss rdbss.sys Tue Jul 14 02:14:26 2009 (4A5BBFD2) c9779000 c9783000 mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD) c9783000 c978f000 discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214) c97aa000 c97ba000 volmgr volmgr.sys Tue Jul 14 02:11:25 2009 (4A5BBF1D) c97ba000 c97f8000 NETIO NETIO.SYS Tue Jul 14 02:12:35 2009 (4A5BBF63) c9800000 c9825000 ksecpkg ksecpkg.sys Fri Dec 11 06:04:22 2009 (4B21C4C6) c9825000 c9838000 wanarp wanarp.sys Tue Jul 14 02:55:02 2009 (4A5BC956) c983c000 c9887000 volmgrx volmgrx.sys Tue Jul 14 02:11:41 2009 (4A5BBF2D) c9887000 c988e000 pciide pciide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17) c988e000 c989c000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:11:15 2009 (4A5BBF13) c989c000 c98b2000 mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F) c98b2000 c98bb000 atapi atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13) c98bb000 c98de000 ataport ataport.SYS Tue Jul 14 02:11:18 2009 (4A5BBF16) c98de000 c98e7000 amdxata amdxata.sys Tue May 19 20:57:35 2009 (4A12F30F) c98e7000 c991b000 fltmgr fltmgr.sys Tue Jul 14 02:11:13 2009 (4A5BBF11) c991b000 c992c000 fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F) c992c000 c99e3000 ndis ndis.sys Tue Jul 14 02:12:24 2009 (4A5BBF58) c99e3000 c99fd000 serial serial.sys Tue Jul 14 02:45:33 2009 (4A5BC71D) c9a00000 c9a10000 mup mup.sys Tue Jul 14 02:14:14 2009 (4A5BBFC6) c9a11000 c9b40000 Ntfs Ntfs.sys Tue Jul 14 02:12:05 2009 (4A5BBF45) c9b40000 c9b6b000 msrpc msrpc.sys Tue Jul 14 02:11:59 2009 (4A5BBF3F) c9b6b000 c9b7e000 ksecdd ksecdd.sys Tue Jul 14 02:11:56 2009 (4A5BBF3C) c9b7e000 c9bdb000 cng cng.sys Tue Jul 14 02:32:55 2009 (4A5BC427) c9bdb000 c9be9000 pcw pcw.sys Tue Jul 14 02:11:10 2009 (4A5BBF0E) c9be9000 c9bf2000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:11:14 2009 (4A5BBF12) c9bf2000 c9bfc000 nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48) c9c00000 c9c2d000 rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A) c9c2d000 c9c35000 hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05) c9c35000 c9d7e000 tcpip tcpip.sys Mon Jun 14 06:36:59 2010 (4C15A3DB) c9d7e000 c9daf000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43) c9daf000 c9db7380 vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C) c9db8000 c9df7000 volsnap volsnap.sys Tue Jul 14 02:11:34 2009 (4A5BBF26) c9df7000 c9dff000 spldr spldr.sys Mon May 11 19:13:47 2009 (4A084EBB) c9e00000 c9e08420 oreans32 oreans32.sys Tue Jul 11 10:05:03 2006 (44B34D9F) c9e0f000 c9e41000 fvevol fvevol.sys Sat Sep 26 05:24:21 2009 (4ABD7B55) c9e41000 c9e52000 disk disk.sys Tue Jul 14 02:11:28 2009 (4A5BBF20) c9e52000 c9e77000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18) c9e77000 c9e83000 kbdhid kbdhid.sys Tue Jul 14 02:45:09 2009 (4A5BC705) c9e83000 c9e9e000 luafv luafv.sys Tue Jul 14 02:15:44 2009 (4A5BC020) c9ea9000 c9ec8000 cdrom cdrom.sys Tue Jul 14 02:11:24 2009 (4A5BBF1C) c9ec8000 c9ecf000 Null Null.SYS Tue Jul 14 02:11:12 2009 (4A5BBF10) c9ecf000 c9ed6000 Beep Beep.SYS Tue Jul 14 02:45:00 2009 (4A5BC6FC) c9ed6000 c9ef3000 ehdrv ehdrv.sys Thu May 14 16:31:56 2009 (4A0C1D4C) c9ef3000 c9eff000 vga vga.sys Tue Jul 14 02:25:50 2009 (4A5BC27E) c9eff000 c9f20000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D) c9f20000 c9f2d000 watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A) c9f2d000 c9f35000 RDPCDD RDPCDD.sys Tue Jul 14 03:01:40 2009 (4A5BCAE4) c9f35000 c9f3d000 rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3) c9f3d000 c9f45000 rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5) c9f45000 c9f50000 Msfs Msfs.SYS Tue Jul 14 02:11:26 2009 (4A5BBF1E) c9f50000 c9f5e000 Npfs Npfs.SYS Tue Jul 14 02:11:31 2009 (4A5BBF23) c9f5e000 c9f75000 tdx tdx.sys Tue Jul 14 02:12:10 2009 (4A5BBF4A) c9f75000 c9f80000 TDI TDI.SYS Tue Jul 14 02:12:12 2009 (4A5BBF4C) c9f80000 c9fda000 afd afd.sys Tue Jul 14 02:12:34 2009 (4A5BBF62) c9fda000 c9fe3000 ws2ifsl ws2ifsl.sys Tue Jul 14 02:55:01 2009 (4A5BC955) c9fe3000 c9fea000 wfplwf wfplwf.sys Tue Jul 14 02:53:51 2009 (4A5BC90F) c9fea000 c9ff8000 netbios netbios.sys Tue Jul 14 02:53:54 2009 (4A5BC912) cec00000 cec0d000 mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13) cec0d000 cec20b00 usbaudio usbaudio.sys Tue Jul 14 02:51:23 2009 (4A5BC87B) cec25000 cec89000 csc csc.sys Tue Jul 14 02:15:08 2009 (4A5BBFFC) cec89000 ceca1000 dfsc dfsc.sys Tue Jul 14 02:14:16 2009 (4A5BBFC8) ceca1000 cecaf000 blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8) cecaf000 cecd0000 tunnel tunnel.sys Tue Jul 14 02:54:03 2009 (4A5BC91B) cecd0000 cece2000 intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07) cece2000 cecf1000 L1E62x86 L1E62x86.sys Thu Jun 11 09:39:12 2009 (4A30A690) cecf1000 cecfc000 fdc fdc.sys Tue Jul 14 02:45:45 2009 (4A5BC729) cecfc000 ced06000 serenum serenum.sys Tue Jul 14 02:45:27 2009 (4A5BC717) ced06000 ced3f000 a9d4hlmb a9d4hlmb.SYS Wed Jul 15 00:12:41 2009 (4A5CF4C9) ced3f000 ced4c000 CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716) ced4c000 ced5e000 AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954) ced5e000 ced76000 rasl2tp rasl2tp.sys Tue Jul 14 02:54:33 2009 (4A5BC939) ced76000 ced81000 ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930) ced81000 ceda3000 ndiswan ndiswan.sys Tue Jul 14 02:54:34 2009 (4A5BC93A) ceda3000 cedbb000 raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D) cedbb000 cedd2000 raspptp raspptp.sys Tue Jul 14 02:54:47 2009 (4A5BC947) cedd2000 cede9000 rassstp rassstp.sys Tue Jul 14 02:54:57 2009 (4A5BC951) cede9000 cedf3000 rdpbus rdpbus.sys Tue Jul 14 03:02:40 2009 (4A5BCB20) cedf3000 cee00000 kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13) d0000000 d0011000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F) d0011000 d00154e0 WmHidLo WmHidLo.sys Wed Apr 13 05:21:31 2005 (425C822B) d0016000 d001b6e0 WmFilter WmFilter.sys Wed Apr 13 05:21:30 2005 (425C822A) d001c000 d0027000 monitor monitor.sys Tue Jul 14 02:25:58 2009 (4A5BC286) d002c000 d0060000 ks ks.sys Thu Mar 04 05:57:52 2010 (4B8F2FC0) d0060000 d00627a0 WmBEnum WmBEnum.sys Wed Apr 13 05:21:27 2005 (425C8227) d0063000 d006e1c0 WmXlCore WmXlCore.sys Wed Apr 13 05:21:25 2005 (425C8225) d006f000 d007d000 umbus umbus.sys Tue Jul 14 02:51:38 2009 (4A5BC88A) d007d000 d00c1000 usbhub usbhub.sys Tue Jul 14 02:52:06 2009 (4A5BC8A6) d00c1000 d00cb000 flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729) d00cb000 d00dc000 NDProxy NDProxy.SYS Tue Jul 14 02:54:27 2009 (4A5BC933) d00dc000 d012c000 HdAudio HdAudio.sys Tue Jul 14 02:51:46 2009 (4A5BC892) d012c000 d015b000 portcls portcls.sys Tue Jul 14 02:51:00 2009 (4A5BC864) d015b000 d0174000 drmk drmk.sys Tue Jul 14 03:36:05 2009 (4A5BD2F5) d0174000 d017e000 Dxapi Dxapi.sys Tue Jul 14 02:25:25 2009 (4A5BC265) d017e000 d0195000 usbccgp usbccgp.sys Tue Jul 14 02:51:31 2009 (4A5BC883) d0195000 d0196700 USBD USBD.SYS Tue Jul 14 02:51:05 2009 (4A5BC869) d0197000 d01a2000 hidusb hidusb.sys Tue Jul 14 02:51:04 2009 (4A5BC868) d01a2000 d01b5000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865) d01b5000 d01bb480 HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863) d01bc000 d01c7000 mouhid mouhid.sys Tue Jul 14 02:45:08 2009 (4A5BC704) d01c7000 d01dd000 cdfs cdfs.sys Tue Jul 14 02:11:14 2009 (4A5BBF12) d01dd000 d01ea000 crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E) d01ea000 d01f5000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14) d01f5000 d01fe000 dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13) d0e00000 d0e1f000 HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F) d0e1f000 d0e20380 swenum swenum.sys Tue Jul 14 02:45:08 2009 (4A5BC704) d0e28000 d18a5dc0 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162) d18a6000 d18a7040 nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033) d18a8000 d195f000 dxgkrnl dxgkrnl.sys Fri Oct 02 03:48:33 2009 (4AC54DE1) d195f000 d1998000 dxgmms1 dxgmms1.sys Tue Jul 14 02:25:25 2009 (4A5BC265) d1998000 d19a3000 usbuhci usbuhci.sys Tue Jul 14 02:51:10 2009 (4A5BC86E) d19a3000 d19ee000 USBPORT USBPORT.SYS Tue Jul 14 02:51:13 2009 (4A5BC871) d19ee000 d19fd000 usbehci usbehci.sys Tue Jul 14 02:51:14 2009 (4A5BC872) d3220000 d323e000 cdd cdd.dll unavailable (00000000) d3390000 d35da000 win32k win32k.sys unavailable (00000000) d35f0000 d35f9000 TSDDD TSDDD.dll unavailable (00000000) d400d000 d40c9000 eamon eamon.sys Thu May 14 16:30:44 2009 (4A0C1D04) d40c9000 d40e3000 WudfPf WudfPf.sys Tue Jul 14 02:50:13 2009 (4A5BC835) d40e3000 d40f3000 lltdio lltdio.sys Tue Jul 14 02:53:18 2009 (4A5BC8EE) d40f3000 d4106000 rspndr rspndr.sys Tue Jul 14 02:53:20 2009 (4A5BC8F0) d4106000 d418b000 HTTP HTTP.sys Tue Jul 14 02:12:53 2009 (4A5BBF75) d418b000 d41a4000 bowser bowser.sys Tue Jul 14 02:14:21 2009 (4A5BBFCD) d41a4000 d41b6000 mpsdrv mpsdrv.sys Tue Jul 14 02:52:52 2009 (4A5BC8D4) d41b6000 d41d9000 mrxsmb mrxsmb.sys Sat Feb 27 09:32:02 2010 (4B88CA72) dc22f000 dc280000 srv srv.sys Tue Jun 22 05:47:32 2010 (4C202444) dc322000 dc34c000 fastfat fastfat.SYS Tue Jul 14 02:14:01 2009 (4A5BBFB9) de42d000 de468000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85) de468000 de483000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B) de49b000 de4b4000 epfwwfpr epfwwfpr.sys Thu May 14 16:12:06 2009 (4A0C18A6) de4b4000 de54b000 peauth peauth.sys Tue Jul 14 03:35:44 2009 (4A5BD2E0) de54b000 de555000 secdrv secdrv.SYS Wed Sep 13 16:18:32 2006 (45080528) de555000 de576000 srvnet srvnet.sys Tue Jun 22 05:47:09 2010 (4C20242D) de576000 de583000 tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926) de583000 de5d2000 srv2 srv2.sys Tue Jun 22 05:47:19 2010 (4C202437) e0bb1000 e0bb9000 kdcom kdcom.dll Tue Jul 14 04:08:58 2009 (4A5BDAAA) e2a12000 e2e22000 nt ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC) e2e22000 e2e59000 hal halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07) Unloaded modules: dc2ea000 dc301000 USBSTOR.SYS Timestamp: unavailable (00000000) Checksum: 00000000 dc34c000 dc36d000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 dc301000 dc322000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 dc280000 dc2ea000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 de483000 de49b000 parport.sys Timestamp: unavailable (00000000) Checksum: 00000000 c9e77000 c9e84000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 c9e84000 c9e8f000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 c9e8f000 c9e98000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 c9e98000 c9ea9000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 c96d7000 c97aa000 ztgsan.sys Timestamp: unavailable (00000000) Checksum: 00000000
OK i ve did exactly what did you told me, but now i have a problem with my explorer.
Every time i want to run a program in administrator (right click on the mouse and run as administrator) it says explorer stoped working, and then it sayt that is going to run it again.
Thanks for previous post!
Can you help me quick please!!!
Of what I had suggested you did only add MSE to your system, but you didn't uninstall your OLD Eset.
See this thread https://www.sevenforums.com/crashes-d...gain-help.html
If you cannot update Logitech Wingman, then unplug it and do not use it. Uninstall Daemon Tools and update your Atheros Ethernet Controller. Make sure to update drivers and to remove Eset.
~~~~~~~~~~~~~~~~~
Do the memtest overnight RAM - Test with Memtest86+
Now i have problems with explorer.exe
It yust stops working when i want to press right click on the mouse and then it turns back on.
It gives me: Runtime error 217 at 04b8f822