BSOP report-problem


  1. Posts : 8
    Microsoft Windows 7 Ultimate Edition (build 7600), 32-bit
       #1

    BSOP report-problem


    I ve add Windows_NT6_BSOD_jcgriff2 folder in a rar, because i could upload it.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    One of your crashes was caused by xyadrec.sys Fri Oct 08 21:12:51 2010, I cannot find anything on this file and if you can't either then scan your system for malware.


    You have Eset Smart Security:

    ehdrv.sys Thu May 14 16:31:56 2009
    eamon.sys Thu May 14 16:30:44 2009

    Replace it with the latest Eset version (2010), OR install Microsoft Security Essentials instead:

    http://www.microsoft.com/security_essentials/

    ESET - Antivirus Software with Spyware and Malware Protection


    Update:

    WmHidLo.sys Wed Apr 13 05:21:31 2005
    WmFilter.sys Wed Apr 13 05:21:30 2005
    WmBEnum.sys Wed Apr 13 05:21:27 2005
    WmXlCore.sys Wed Apr 13 05:21:25 2005
    Logitech WingMan Software

    sptd.sys Sun Oct 11 23:54:02 2009
    Daemon/Alcohol/Duplex - uninstall it for now

    L1E62x86.sys Thu Jun 11 09:39:12 2009
    Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller

    a9d4hlmb.SYS Wed Jul 15 00:12:41 2009
    ? some software, I can't find any info on this file




    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\091810-29343-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe281f000 PsLoadedModuleList = 0xe2967810
    Debug session time: Sat Sep 18 16:27:36.974 2010 (GMT-5)
    System Uptime: 0 days 5:18:56.550
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, e285de85, d6551b60, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: e285de85, The address that the exception occurred at
    Arg3: d6551b60, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!memset+45
    e285de85 f3ab            rep stos dword ptr es:[edi]
    
    TRAP_FRAME:  d6551b60 -- (.trap 0xffffffffd6551b60)
    ErrCode = 00000002
    eax=00000000 ebx=00000000 ecx=00000040 edx=00000000 esi=c4b00188 edi=00000000
    eip=e285de85 esp=d6551bd4 ebp=d6551bfc iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!memset+0x45:
    e285de85 f3ab            rep stos dword ptr es:[edi]
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  PnkBstrB.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from e285b4bc to e285de85
    
    STACK_TEXT:  
    d6551bfc e285b4bc c4b00188 c533a598 c533a598 nt!memset+0x45
    d6551c14 e2a5cf6e c528b8c0 c533a598 c533a608 nt!IofCallDriver+0x63
    d6551c34 e2a79d5f c4b00188 c528b8c0 00000000 nt!IopSynchronousServiceTail+0x1f8
    d6551cd0 e2a7c53a c4b00188 c533a598 00000000 nt!IopXxxControlFile+0x6aa
    d6551d04 e286244a 00000118 00000114 00000000 nt!NtDeviceIoControlFile+0x2a
    d6551d04 777f64f4 00000118 00000114 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0096eb90 00000000 00000000 00000000 00000000 0x777f64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!IofCallDriver+63
    e285b4bc 5e              pop     esi
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!IofCallDriver+63
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac
    
    FAILURE_BUCKET_ID:  0x8E_nt!IofCallDriver+63
    
    BUCKET_ID:  0x8E_nt!IofCallDriver+63
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101410-24960-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.x86fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xe2a12000 PsLoadedModuleList = 0xe2b5a810
    Debug session time: Thu Oct 14 17:56:53.045 2010 (GMT-5)
    System Uptime: 0 days 1:31:35.746
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {f3b79000, 2, 0, c9608ccb}
    
    Unable to load image \SystemRoot\System32\Drivers\xyadrec.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for xyadrec.sys
    *** ERROR: Module load completed but symbols could not be loaded for xyadrec.sys
    Unable to load image \SystemRoot\system32\DRIVERS\L1E62x86.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for L1E62x86.sys
    *** ERROR: Module load completed but symbols could not be loaded for L1E62x86.sys
    Probably caused by : xyadrec.sys ( xyadrec+4ccb )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: f3b79000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: c9608ccb, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from e2b7a718
    Unable to read MiSystemVaType memory at e2b5a160
     f3b79000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    xyadrec+4ccb
    c9608ccb 0fb618          movzx   ebx,byte ptr [eax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  c91dbe94 -- (.trap 0xffffffffc91dbe94)
    ErrCode = 00000000
    eax=f3b79000 ebx=00000040 ecx=f3b78fff edx=f3b78ffc esi=f3b78fff edi=f3b78a60
    eip=c9608ccb esp=c91dbf08 ebp=c91dbf18 iopl=0         nv up ei ng nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010287
    xyadrec+0x4ccb:
    c9608ccb 0fb618          movzx   ebx,byte ptr [eax]         ds:0023:f3b79000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from c9608ccb to e2a5882b
    
    STACK_TEXT:  
    c91dbe94 c9608ccb badb0d00 f3b78ffc 000005a0 nt!KiTrap0E+0x2cf
    WARNING: Stack unwind information not available. Following frames may be wrong.
    c91dbf18 c962d7aa f3b79000 f3b78ffc c91dc048 xyadrec+0x4ccb
    c91dbf34 c97e4589 c91dc350 c91dc368 000005a0 xyadrec+0x297aa
    c91dbf8c c97e489c c91dc028 c36fd008 c36fd008 NETIO!StreamInvokeCalloutAndNormalizeAction+0xce
    c91dbfbc c97e49b7 c91dc028 c36fd008 c36fd008 NETIO!StreamCalloutProcessData+0x31
    c91dbffc c97e4e1d c91dc028 c36fd008 c36fd008 NETIO!StreamCalloutProcessingLoop+0x55
    c91dc068 c97d2f56 00000014 c96085a9 00000000 NETIO!StreamProcessCallout+0x128
    c91dc0cc c97bd334 00000014 c91dc350 c91dc368 NETIO!ProcessCallout+0x120
    c91dc140 c97bc25c 00000014 c91dc350 c91dc368 NETIO!ArbitrateAndEnforce+0xae
    c91dc250 c97e2332 00000014 c91dc350 c91dc368 NETIO!KfdClassify+0x1c7
    c91dc2e4 c97e26fe 00000014 c91dc350 c91dc368 NETIO!StreamClassify+0xa0
    c91dc4c4 c97e2b91 c4002bb0 00000014 c91dc4f0 NETIO!StreamCommonInspect+0x252
    c91dc4f8 c9cd1d2d c4002bb0 00000000 c2c38ae0 NETIO!WfpStreamInspectReceive+0xb8
    c91dc520 c9c99362 c2936760 c2936858 c2c38ae0 tcpip!TcpInspectReceive+0x55
    c91dc570 c9c985a6 c2936760 c91dc594 c91dc5cc tcpip!TcpTcbFastDatagram+0x2fd
    c91dc5d8 c9c989ac c3621750 c2936760 001dc64c tcpip!TcpTcbReceive+0x142
    c91dc640 c9c87b4c c35fb6e0 c361b000 00000000 tcpip!TcpMatchReceive+0x237
    c91dc690 c9c878ae c3621750 c361b000 0000c0de tcpip!TcpPreValidatedReceive+0x293
    c91dc6ac c9c8d273 c3621750 c361b000 c91dc6e8 tcpip!TcpReceive+0x2d
    c91dc6bc c9cbf50e c91dc6d0 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    c91dc6e8 c9cbf2d1 c9d1ef88 c91dc73c c000023e tcpip!IppDeliverListToProtocol+0x49
    c91dc708 c9cbefa6 c9d1ed98 00000006 c91dc73c tcpip!IppProcessDeliverList+0x2a
    c91dc760 c9cbcbe4 c9d1ed98 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1f2
    c91dc7f4 c9cbbb75 c40b6428 00000000 c3fd8001 tcpip!IpFlcReceivePackets+0xbe5
    c91dc870 c9cbbce6 c4571a88 c41207e8 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    c91dc8a4 e2aa1faa c41207e8 e781d7b9 c3623128 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    c91dc90c c9cbbd6e c9cbbbc8 c91dc934 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    c91dc948 c999418d c4571a02 c4120700 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    c91dc980 c9982670 c4571200 c41207e8 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    c91dc9a8 c99825e7 00000000 c41207e8 c3fcc0e0 ndis!ndisIndicateSortedNetBufferLists+0x4a
    c91dcb24 c992dca5 c3fcc0e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    c91dcb40 c9982a2e c3fcc0e0 c41207e8 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    c91dcb68 c992dc1e c3fcc0e0 c41207e8 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    c91dcb90 cece79ea c3fcc0e0 c41207e8 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    c91dcbe4 ceceb0eb 000c9000 c91dcc40 00000000 L1E62x86+0x59ea
    c91dcc04 cece34dc c40c9000 c91dcc40 c91dcc50 L1E62x86+0x90eb
    c91dcc14 c9982309 c40c9000 00000000 c91dcc40 L1E62x86+0x14dc
    c91dcc50 c992d9f4 c40813f4 000813e0 00000000 ndis!ndisMiniportDpc+0xe2
    c91dcc78 e2a7a3b5 c40813f4 c40813e0 00000000 ndis!ndisInterruptDpc+0xaf
    c91dccd4 e2a7a218 c91c0120 c91c5800 00000000 nt!KiExecuteAllDpcs+0xf9
    c91dcd20 e2a7a038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xd5
    c91dcd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    xyadrec+4ccb
    c9608ccb 0fb618          movzx   ebx,byte ptr [eax]
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  xyadrec+4ccb
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: xyadrec
    
    IMAGE_NAME:  xyadrec.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4caf5f23
    
    FAILURE_BUCKET_ID:  0xD1_xyadrec+4ccb
    
    BUCKET_ID:  0xD1_xyadrec+4ccb
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmvm xyadrec
    start    end        module name
    c9604000 c96d7000   xyadrec  T (no symbols)           
        Loaded symbol image file: xyadrec.sys
        Image path: \SystemRoot\System32\Drivers\xyadrec.sys
        Image name: xyadrec.sys
        Timestamp:        Fri Oct 08 21:12:51 2010 (4CAF5F23)
        CheckSum:         000CE4BD
        ImageSize:        000D3000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    1: kd> lmtn
    start    end        module name
    c920a000 c9282000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
    c9282000 c9293000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    c9293000 c929b000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    c929b000 c92dd000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    c92dd000 c9388000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    c9388000 c93f9000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    c941c000 c942a000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    c942a000 c951d000   sptd     sptd.sys     Sun Oct 11 23:54:02 2009 (4AD245EA)
    c951d000 c9526000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    c9526000 c954c000   SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
    c954c000 c9594000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    c9594000 c959c000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    c959c000 c95a7000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    c95a7000 c95d1000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    c95d1000 c95e2000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    c9604000 c96d7000   xyadrec  xyadrec.sys  Fri Oct 08 21:12:51 2010 (4CAF5F23)
    c96d7000 c9709000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    c9709000 c9728000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    c9728000 c9738000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    c9738000 c9779000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    c9779000 c9783000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    c9783000 c978f000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    c97aa000 c97ba000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    c97ba000 c97f8000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    c9800000 c9825000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
    c9825000 c9838000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    c983c000 c9887000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    c9887000 c988e000   pciide   pciide.sys   Tue Jul 14 02:11:19 2009 (4A5BBF17)
    c988e000 c989c000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    c989c000 c98b2000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    c98b2000 c98bb000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    c98bb000 c98de000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    c98de000 c98e7000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    c98e7000 c991b000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    c991b000 c992c000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    c992c000 c99e3000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    c99e3000 c99fd000   serial   serial.sys   Tue Jul 14 02:45:33 2009 (4A5BC71D)
    c9a00000 c9a10000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    c9a11000 c9b40000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    c9b40000 c9b6b000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    c9b6b000 c9b7e000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    c9b7e000 c9bdb000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    c9bdb000 c9be9000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    c9be9000 c9bf2000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    c9bf2000 c9bfc000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    c9c00000 c9c2d000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    c9c2d000 c9c35000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    c9c35000 c9d7e000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
    c9d7e000 c9daf000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    c9daf000 c9db7380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    c9db8000 c9df7000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    c9df7000 c9dff000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    c9e00000 c9e08420   oreans32 oreans32.sys Tue Jul 11 10:05:03 2006 (44B34D9F)
    c9e0f000 c9e41000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
    c9e41000 c9e52000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    c9e52000 c9e77000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    c9e77000 c9e83000   kbdhid   kbdhid.sys   Tue Jul 14 02:45:09 2009 (4A5BC705)
    c9e83000 c9e9e000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
    c9ea9000 c9ec8000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    c9ec8000 c9ecf000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    c9ecf000 c9ed6000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    c9ed6000 c9ef3000   ehdrv    ehdrv.sys    Thu May 14 16:31:56 2009 (4A0C1D4C)
    c9ef3000 c9eff000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    c9eff000 c9f20000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    c9f20000 c9f2d000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    c9f2d000 c9f35000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    c9f35000 c9f3d000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    c9f3d000 c9f45000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    c9f45000 c9f50000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    c9f50000 c9f5e000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    c9f5e000 c9f75000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    c9f75000 c9f80000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    c9f80000 c9fda000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    c9fda000 c9fe3000   ws2ifsl  ws2ifsl.sys  Tue Jul 14 02:55:01 2009 (4A5BC955)
    c9fe3000 c9fea000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    c9fea000 c9ff8000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    cec00000 cec0d000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    cec0d000 cec20b00   usbaudio usbaudio.sys Tue Jul 14 02:51:23 2009 (4A5BC87B)
    cec25000 cec89000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    cec89000 ceca1000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    ceca1000 cecaf000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    cecaf000 cecd0000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    cecd0000 cece2000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
    cece2000 cecf1000   L1E62x86 L1E62x86.sys Thu Jun 11 09:39:12 2009 (4A30A690)
    cecf1000 cecfc000   fdc      fdc.sys      Tue Jul 14 02:45:45 2009 (4A5BC729)
    cecfc000 ced06000   serenum  serenum.sys  Tue Jul 14 02:45:27 2009 (4A5BC717)
    ced06000 ced3f000   a9d4hlmb a9d4hlmb.SYS Wed Jul 15 00:12:41 2009 (4A5CF4C9)
    ced3f000 ced4c000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    ced4c000 ced5e000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    ced5e000 ced76000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    ced76000 ced81000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    ced81000 ceda3000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    ceda3000 cedbb000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    cedbb000 cedd2000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    cedd2000 cede9000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    cede9000 cedf3000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    cedf3000 cee00000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    d0000000 d0011000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    d0011000 d00154e0   WmHidLo  WmHidLo.sys  Wed Apr 13 05:21:31 2005 (425C822B)
    d0016000 d001b6e0   WmFilter WmFilter.sys Wed Apr 13 05:21:30 2005 (425C822A)
    d001c000 d0027000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    d002c000 d0060000   ks       ks.sys       Thu Mar 04 05:57:52 2010 (4B8F2FC0)
    d0060000 d00627a0   WmBEnum  WmBEnum.sys  Wed Apr 13 05:21:27 2005 (425C8227)
    d0063000 d006e1c0   WmXlCore WmXlCore.sys Wed Apr 13 05:21:25 2005 (425C8225)
    d006f000 d007d000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    d007d000 d00c1000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    d00c1000 d00cb000   flpydisk flpydisk.sys Tue Jul 14 02:45:45 2009 (4A5BC729)
    d00cb000 d00dc000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    d00dc000 d012c000   HdAudio  HdAudio.sys  Tue Jul 14 02:51:46 2009 (4A5BC892)
    d012c000 d015b000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    d015b000 d0174000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    d0174000 d017e000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    d017e000 d0195000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    d0195000 d0196700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    d0197000 d01a2000   hidusb   hidusb.sys   Tue Jul 14 02:51:04 2009 (4A5BC868)
    d01a2000 d01b5000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
    d01b5000 d01bb480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
    d01bc000 d01c7000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    d01c7000 d01dd000   cdfs     cdfs.sys     Tue Jul 14 02:11:14 2009 (4A5BBF12)
    d01dd000 d01ea000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    d01ea000 d01f5000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
    d01f5000 d01fe000   dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    d0e00000 d0e1f000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    d0e1f000 d0e20380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    d0e28000 d18a5dc0   nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:14 2010 (4C379162)
    d18a6000 d18a7040   nvBridge nvBridge.kmd Sat Jul 10 00:10:11 2010 (4C379033)
    d18a8000 d195f000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
    d195f000 d1998000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    d1998000 d19a3000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
    d19a3000 d19ee000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    d19ee000 d19fd000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    d3220000 d323e000   cdd      cdd.dll      unavailable (00000000)
    d3390000 d35da000   win32k   win32k.sys   unavailable (00000000)
    d35f0000 d35f9000   TSDDD    TSDDD.dll    unavailable (00000000)
    d400d000 d40c9000   eamon    eamon.sys    Thu May 14 16:30:44 2009 (4A0C1D04)
    d40c9000 d40e3000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
    d40e3000 d40f3000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
    d40f3000 d4106000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
    d4106000 d418b000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
    d418b000 d41a4000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
    d41a4000 d41b6000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
    d41b6000 d41d9000   mrxsmb   mrxsmb.sys   Sat Feb 27 09:32:02 2010 (4B88CA72)
    dc22f000 dc280000   srv      srv.sys      Tue Jun 22 05:47:32 2010 (4C202444)
    dc322000 dc34c000   fastfat  fastfat.SYS  Tue Jul 14 02:14:01 2009 (4A5BBFB9)
    de42d000 de468000   mrxsmb10 mrxsmb10.sys Sat Feb 27 09:32:21 2010 (4B88CA85)
    de468000 de483000   mrxsmb20 mrxsmb20.sys Sat Feb 27 09:32:11 2010 (4B88CA7B)
    de49b000 de4b4000   epfwwfpr epfwwfpr.sys Thu May 14 16:12:06 2009 (4A0C18A6)
    de4b4000 de54b000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
    de54b000 de555000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
    de555000 de576000   srvnet   srvnet.sys   Tue Jun 22 05:47:09 2010 (4C20242D)
    de576000 de583000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
    de583000 de5d2000   srv2     srv2.sys     Tue Jun 22 05:47:19 2010 (4C202437)
    e0bb1000 e0bb9000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    e2a12000 e2e22000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
    e2e22000 e2e59000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    
    Unloaded modules:
    dc2ea000 dc301000   USBSTOR.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    dc34c000 dc36d000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    dc301000 dc322000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    dc280000 dc2ea000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    de483000 de49b000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9e77000 c9e84000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9e84000 c9e8f000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9e8f000 c9e98000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c9e98000 c9ea9000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    c96d7000 c97aa000   ztgsan.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  3. Posts : 8
    Microsoft Windows 7 Ultimate Edition (build 7600), 32-bit
    Thread Starter
       #3

    Problems


    OK i ve did exactly what did you told me, but now i have a problem with my explorer.
    Every time i want to run a program in administrator (right click on the mouse and run as administrator) it says explorer stoped working, and then it sayt that is going to run it again.
    Thanks for previous post!
      My Computer


  4. Posts : 8
    Microsoft Windows 7 Ultimate Edition (build 7600), 32-bit
    Thread Starter
       #4

    Can you help me quick please!!!
      My Computer


  5. Posts : 670
    Windows 7 x64
       #5

    core1111 said:
    OK i ve did exactly what did you told me, but now i have a problem with my explorer.
    Every time i want to run a program in administrator (right click on the mouse and run as administrator) it says explorer stoped working, and then it sayt that is going to run it again.
    Thanks for previous post!
    Of what I had suggested you did only add MSE to your system, but you didn't uninstall your OLD Eset.

    See this thread https://www.sevenforums.com/crashes-d...gain-help.html

    If you cannot update Logitech Wingman, then unplug it and do not use it. Uninstall Daemon Tools and update your Atheros Ethernet Controller. Make sure to update drivers and to remove Eset.

    ~~~~~~~~~~~~~~~~~

    Do the memtest overnight RAM - Test with Memtest86+
      My Computer


  6. Posts : 8
    Microsoft Windows 7 Ultimate Edition (build 7600), 32-bit
    Thread Starter
       #6

    Now i have problems with explorer.exe
    It yust stops working when i want to press right click on the mouse and then it turns back on.
    It gives me: Runtime error 217 at 04b8f822
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 15:25.
Find Us