when plug...iphone/ipad BSOD....

Page 1 of 2 12 LastLast

  1. Posts : 33
    [OEM] Win Vista Business > upgraded to Win 7 Ultimate 32bit
       #1

    when plug...iphone/ipad BSOD....


    hey guys..
    its really really annoying
    heres the problem
    i plug in my iphone/ipad...great. no problem
    problem only comes out when; i shut off the device when its connect...i get freeze then bsod...; and when i UNPLUG it...so its like i plug it...fine no pro...when i unplug it...my laptop freeze and then restarts automaticly...
    soo

    help....

    [UPDATE 2010, nov 10]
    PERFMON report


    thanks a lot......!!!!!!!!!
    Last edited by Brink; 03 Jan 2013 at 23:59. Reason: broken link removed
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    One of your latest crashes was caused by:

    mpfilt.sys Tue Nov 01 07:58:46 2005
    there's not much info on this file, it may be a mouse driver. Locate this file in C:\Windows\system32\drivers, open up its properties and see what it says there. It's too old and must be updated.


    Other old drivers you should definitely update:

    VSTDPV3.SYS Thu Oct 16 03:32:04 2008
    Conexant SoftK56 Modem - update or disable this one

    taphss.sys Wed Sep 09 23:55:14 2009
    TAP-Win32 Virtual Network AnchorFree Inc

    SonyPI.sys Fri Aug 03 08:41:08 2007
    Sony Programmable I/O Control Device

    SCDEmu.SYS Mon Nov 09 05:21:19 2009
    PowerISO

    rimsptsk.sys Wed Mar 12 12:43:06 2008
    Ricoh Memorystick Controller

    netw5v32.sys Thu Mar 26 18:10:37 2009
    Intel® Wireless WiFi Link Adapter

    mchInjDrv.sys Wed Jan 11 09:07:52 2006
    madCodeHook DLL injection driver - could be malware

    LMouFilt.Sys Fri Dec 19 09:37:27 2008
    Logitech SetPoint

    igdkmd32.sys Wed May 06 21:13:40 2009
    Intel GMA

    e1y6032.sys Tue Aug 19 00:44:37 2008
    Intel(R) Gigabit Network Connection




    Your Kaspersky version is outdated. Replace it for now with bsod-proof MSE:

    Removal tool for Kaspersky Lab products

    http://www.microsoft.com/security_essentials/

    Scan you system for malware.


    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\122709-15678-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x8340e000 PsLoadedModuleList = 0x83556810
    Debug session time: Sun Dec 27 18:23:47.376 2009 (UTC - 5:00)
    System Uptime: 0 days 1:31:02.000
    Loading Kernel Symbols
    ..................................................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 0, 8d717b70, 8d717750}
    
    Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+63 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 00000000, The address that the exception occurred at
    Arg3: 8d717b70, Exception Record Address
    Arg4: 8d717750, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    +19
    00000000 ??              ???
    
    EXCEPTION_RECORD:  8d717b70 -- (.exr 0xffffffff8d717b70)
    ExceptionAddress: 00000000
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000008
       Parameter[1]: 00000000
    Attempt to execute non-executable address 00000000
    
    CONTEXT:  8d717750 -- (.cxr 0xffffffff8d717750)
    eax=86921320 ebx=867009e0 ecx=0000000f edx=867009e0 esi=863a2030 edi=86700b20
    eip=00000000 esp=8d717c38 ebp=8d717c4c iopl=0         nv up ei ng nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010287
    00000000 ??              ???
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000008
    
    EXCEPTION_PARAMETER2:  00000000
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 83576718
    Unable to read MiSystemVaType memory at 83556160
     00000000 
    
    FOLLOWUP_IP: 
    nt!IofCallDriver+63
    8344a4bc 5e              pop     esi
    
    FAILED_INSTRUCTION_ADDRESS: 
    +63
    00000000 ??              ???
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from 8344a4bc to 00000000
    
    STACK_TEXT:  
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    8d717c34 8344a4bc 863a2030 867009e0 91fef8a0 0x0
    8d717c64 8344a4bc 000002fb 867009e0 8d717cd4 nt!IofCallDriver+0x63
    8d717cec 8362e7b5 860f9bf8 860f9bf8 85b67d48 nt!IofCallDriver+0x63
    8d717d00 8347bf2b 8608e810 00000000 85b67d48 nt!IopProcessWorkItem+0x23
    8d717d50 8361c66d 00000001 a4777f1b 00000000 nt!ExpWorkerThread+0x10d
    8d717d90 834ce0d9 8347be1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!IofCallDriver+63
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    STACK_COMMAND:  .cxr 0xffffffff8d717750 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_NULL_IP_nt!IofCallDriver+63
    
    BUCKET_ID:  0x7E_NULL_IP_nt!IofCallDriver+63
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\122409-14586-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x83410000 PsLoadedModuleList = 0x83558810
    Debug session time: Thu Dec 24 16:42:37.378 2009 (UTC - 5:00)
    System Uptime: 0 days 1:11:15.001
    Loading Kernel Symbols
    ..................................................
    Loading User Symbols
    Missing image name, possible paged-out or corrupt data.
    Loading unloaded module list
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .Missing image name, possible paged-out or corrupt data.
    .
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 8344c4b8, 8d713b74, 8d713750}
    
    Probably caused by : ntkrpamp.exe ( nt!IofCallDriver+5f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8344c4b8, The address that the exception occurred at
    Arg3: 8d713b74, Exception Record Address
    Arg4: 8d713750, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!IofCallDriver+5f
    8344c4b8 ff548838        call    dword ptr [eax+ecx*4+38h]
    
    EXCEPTION_RECORD:  8d713b74 -- (.exr 0xffffffff8d713b74)
    ExceptionAddress: 8344c4b8 (nt!IofCallDriver+0x0000005f)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 00000074
    Attempt to read from address 00000074
    
    CONTEXT:  8d713750 -- (.cxr 0xffffffff8d713750)
    eax=00000000 ebx=86072bc8 ecx=0000000f edx=86072bc8 esi=860eb6a8 edi=86072d08
    eip=8344c4b8 esp=8d713c3c ebp=8d713c4c iopl=0         nv up ei ng nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010287
    nt!IofCallDriver+0x5f:
    8344c4b8 ff548838        call    dword ptr [eax+ecx*4+38h] ds:0023:00000074=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  00000074
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 83578718
    Unable to read MiSystemVaType memory at 83558160
     00000074 
    
    FOLLOWUP_IP: 
    nt!IofCallDriver+5f
    8344c4b8 ff548838        call    dword ptr [eax+ecx*4+38h]
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 91a399fb to 8344c4b8
    
    STACK_TEXT:  
    8d713c4c 91a399fb 895d69b8 86170ed0 00000000 nt!IofCallDriver+0x5f
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    8d713c64 8344c4bc 00000339 86072bc8 8d713cd4 0x91a399fb
    8d713cec 836307b5 85f57100 85f57100 85b77a70 nt!IofCallDriver+0x63
    8d713d00 8347df2b 8636f0c0 00000000 85b77a70 nt!IopProcessWorkItem+0x23
    8d713d50 8361e66d 00000001 a47637e2 00000000 nt!ExpWorkerThread+0x10d
    8d713d90 834d00d9 8347de1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!IofCallDriver+5f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    STACK_COMMAND:  .cxr 0xffffffff8d713750 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!IofCallDriver+5f
    
    BUCKET_ID:  0x7E_nt!IofCallDriver+5f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [I:\122709-28641-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x83449000 PsLoadedModuleList = 0x83591810
    Debug session time: Sun Dec 27 12:02:25.753 2009 (UTC - 5:00)
    System Uptime: 0 days 1:47:15.000
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..................................................
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 0, 8d713b70, 8d713750}
    
    *** WARNING: Unable to verify timestamp for mpfilt.sys
    *** ERROR: Module load completed but symbols could not be loaded for mpfilt.sys
    *** WARNING: Unable to verify timestamp for usbaapl.sys
    *** ERROR: Module load completed but symbols could not be loaded for usbaapl.sys
    Probably caused by : mpfilt.sys ( mpfilt+9fb )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 00000000, The address that the exception occurred at
    Arg3: 8d713b70, Exception Record Address
    Arg4: 8d713750, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    +19
    00000000 ??              ???
    
    EXCEPTION_RECORD:  8d713b70 -- (.exr 0xffffffff8d713b70)
    ExceptionAddress: 00000000
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000008
       Parameter[1]: 00000000
    Attempt to execute non-executable address 00000000
    
    CONTEXT:  8d713750 -- (.cxr 0xffffffff8d713750)
    eax=00095652 ebx=85ecbbf8 ecx=0000000f edx=85ecbbf8 esi=86035030 edi=85ecbd38
    eip=00000000 esp=8d713c38 ebp=8d713c4c iopl=0         nv up ei ng nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010287
    00000000 ??              ???
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000008
    
    EXCEPTION_PARAMETER2:  00000000
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 835b1718
    Unable to read MiSystemVaType memory at 83591160
     00000000 
    
    FOLLOWUP_IP: 
    mpfilt+9fb
    91fd39fb ??              ???
    
    FAILED_INSTRUCTION_ADDRESS: 
    +9fb
    00000000 ??              ???
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from 834854bc to 00000000
    
    STACK_TEXT:  
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    8d713c34 834854bc 86035030 85ecbbf8 91fd38a0 0x0
    8d713c4c 91fd39fb 867586b8 85fc9ed0 00000000 nt!IofCallDriver+0x63
    8d713c64 834854bc 000004fa 85ecbbf8 8d713cd4 mpfilt+0x9fb
    8d713c7c c12738f2 85ff3030 85ff30e8 835835bc nt!IofCallDriver+0x63
    8d713cac c1279ac8 867586b8 8d713cc8 85ff35bd usbaapl+0x18f2
    8d713cd8 c127607c 85ff3030 866d43a8 85ff3030 usbaapl+0x7ac8
    8d713cec 836697b5 8654c420 8654c420 85b77a70 usbaapl+0x407c
    8d713d00 834b6f2b 866d43a8 00000000 85b77a70 nt!IopProcessWorkItem+0x23
    8d713d50 8365766d 00000001 c3912940 00000000 nt!ExpWorkerThread+0x10d
    8d713d90 835090d9 834b6e1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  mpfilt+9fb
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: mpfilt
    
    IMAGE_NAME:  mpfilt.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  43670416
    
    STACK_COMMAND:  .cxr 0xffffffff8d713750 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_NULL_IP_mpfilt+9fb
    
    BUCKET_ID:  0x7E_NULL_IP_mpfilt+9fb
    
    Followup: MachineOwner
    ---------
    
    
    start    end        module name
    91fd3000 91fd4100   mpfilt   T (no symbols)           
        Loaded symbol image file: mpfilt.sys
        Image path: \??\C:\Windows\system32\drivers\mpfilt.sys
        Image name: mpfilt.sys
        Timestamp:        Tue Nov 01 07:58:46 2005 (43670416)
    
    97229000 97255000   1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
    8b4ac000 8b4f4000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    9133f000 91399000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    972f2000 97304000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    972a5000 972ad000   Alidevice Alidevice.SYS Sun Jul 13 11:10:10 2008 (4879B862)
    83bb2000 83bbb000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    8b400000 8b409000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8b409000 8b42c000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    8b553000 8b55e000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
    90863000 9086a000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    8b7ea000 8b7f8000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    83a98000 83aa0000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    96d31000 96d4a000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
    82021000 8202e000   BthEnum  BthEnum.sys  Tue Jul 14 02:51:35 2009 (4A5BC887)
    81e00000 81e12000   bthmodem bthmodem.sys Tue Jul 14 02:51:34 2009 (4A5BC886)
    81fda000 81ff5000   bthpan   bthpan.sys   Tue Jul 14 02:51:43 2009 (4A5BC88F)
    81f76000 81fda000   bthport  bthport.sys  Tue Jul 14 02:51:30 2009 (4A5BC882)
    821e4000 821f6000   BTHUSB   BTHUSB.sys   Tue Jul 14 02:51:36 2009 (4A5BC888)
    82950000 8296e000   cdd      cdd.dll      unavailable (00000000)
    8b9d6000 8b9f5000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    83ae2000 83b8d000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    8b97e000 8b9a3000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    83aa0000 83ae2000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    90042000 90045700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    8b776000 8b7d3000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    8b54b000 8b553000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    972e5000 972f2000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    82100000 8210d000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    90979000 909dd000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    909dd000 909f5000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    9096d000 90979000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    8b96d000 8b97e000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    901d3000 901ec000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    8210d000 82118000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
    82122000 82133000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    82118000 82122000   dump_msahci dump_msahci.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    82133000 8213d000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    91f1c000 91fd3000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
    90053000 9008c000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    9008c000 900c5000   e1y6032  e1y6032.sys  Tue Aug 19 00:44:37 2008 (48A9ED45)
    83bef000 83c00000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    83bbb000 83bef000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    8b7e1000 8b7ea000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    8b93b000 8b96d000   fvevol   fvevol.sys   Tue Jul 14 02:13:01 2009 (4A5BBF7D)
    8bb81000 8bbb2000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    972d6000 972db280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:16:53 2009 (4A1151B5)
    83412000 83449000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    91a00000 91a1f000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    90154000 901a4000   HdAudio  HdAudio.sys  Tue Jul 14 02:51:46 2009 (4A5BC892)
    ad78f000 ad7aa000   hidbth   hidbth.sys   Tue Jul 14 02:51:33 2009 (4A5BC885)
    ad7aa000 ad7bd000   HIDCLASS HIDCLASS.SYS Tue Jul 14 02:51:01 2009 (4A5BC865)
    8202e000 82034480   HIDPARSE HIDPARSE.SYS Tue Jul 14 02:50:59 2009 (4A5BC863)
    96cac000 96d31000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
    8b933000 8b93b000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    97280000 97298000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
    91a1f000 91f1c000   igdkmd32 igdkmd32.sys Wed May 06 21:13:40 2009 (4A01D354)
    90030000 90042000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
    97298000 972a5000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    80bb3000 80bbb000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    90e1f000 9133f000   kl1      kl1.sys      Tue Sep 01 14:29:07 2009 (4A9D0583)
    83b8d000 83b9a000   klbg     klbg.sys     Wed Oct 14 20:18:07 2009 (4AD607CF)
    9080b000 9085c000   klif     klif.sys     Wed Nov 11 15:32:39 2009 (4AFABCF7)
    913f1000 913f8000   klim6    klim6.sys    Mon Sep 14 13:46:22 2009 (4AAE1EFE)
    972ad000 972b6000   klmouflt klmouflt.sys Fri Oct 02 18:38:31 2009 (4AC61E77)
    973a2000 973d6000   ks       ks.sys       Tue Jul 14 02:45:13 2009 (4A5BC709)
    8b763000 8b776000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    8b8fe000 8b923000   ksecpkg  ksecpkg.sys  Tue Jul 14 02:34:00 2009 (4A5BC468)
    ad7bd000 ad7c4080   LHidFilt LHidFilt.Sys Fri Dec 19 09:37:23 2008 (494B4F33)
    91fef000 91fff000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
    ad7d0000 ad7d7800   LMouFilt LMouFilt.Sys Fri Dec 19 09:37:27 2008 (494B4F37)
    821af000 821ca000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
    ad78e000 ad78ea00   mchInjDrv mchInjDrv.sys Wed Jan 11 09:07:52 2006 (43C4AEC8)
    83a0f000 83a87000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
    820f3000 82100000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
    8213d000 82148000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    972b6000 972c3000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    ad7c5000 ad7d0000   mouhid   mouhid.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    8b5e7000 8b5fd000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    91fd3000 91fd4100   mpfilt   mpfilt.sys   Tue Nov 01 07:58:46 2005 (43670416)
    96d4a000 96d5c000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
    96d5c000 96d7f000   mrxsmb   mrxsmb.sys   Tue Jul 14 02:14:24 2009 (4A5BBFD0)
    96d7f000 96dba000   mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
    96dba000 96dd5000   mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
    83b9a000 83ba4000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
    908bc000 908c7000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    8b4fd000 8b505000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    c1282000 c1283700   MSPCLOCK MSPCLOCK.sys Tue Jul 14 02:45:08 2009 (4A5BC704)
    c1280000 c1281580   MSPQM    MSPQM.sys    Tue Jul 14 02:45:07 2009 (4A5BC703)
    8b738000 8b763000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    90963000 9096d000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    8b923000 8b933000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    8b809000 8b8c0000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    9731c000 97327000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    96c89000 96c99000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
    97327000 97349000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    973e4000 973f5000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    90e00000 90e0e000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    91399000 913cb000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    8b8c0000 8b8fe000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    96e16000 97229000   netw5v32 netw5v32.sys Thu Mar 26 18:10:37 2009 (49CBA8FD)
    908c7000 908d5000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    90959000 90963000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    83449000 83859000   nt       ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
    8b609000 8b738000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    9085c000 90863000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    96c30000 96c76000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
    913d2000 913f1000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    8b53a000 8b54b000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    8b505000 8b52f000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    83ba4000 83bb2000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8b5b9000 8b5e7000   pcmcia   pcmcia.sys   Tue Jul 14 02:19:29 2009 (4A5BC101)
    8b7d3000 8b7e1000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    ad61f000 ad6b6000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
    901a4000 901d3000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    83a87000 83a98000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    97304000 9731c000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    97349000 97361000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    97361000 97378000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    97378000 9738f000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    90918000 90959000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    97396000 973a0000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    908a4000 908ac000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    908ac000 908b4000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    908b4000 908bc000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    8ba08000 8ba35000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    82148000 8216c000   rfcomm   rfcomm.sys   Tue Jul 14 02:51:41 2009 (4A5BC88D)
    97266000 97280000   rimsptsk rimsptsk.sys Wed Mar 12 12:43:06 2008 (47D7B3BA)
    97255000 97266000   risdptsk risdptsk.sys Fri Feb 22 14:35:52 2008 (47BEC1A8)
    96c99000 96cac000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
    9090a000 90917a60   SCDEmu   SCDEmu.SYS   Mon Nov 09 05:21:19 2009 (4AF78AAF)
    ad6b6000 ad6c0000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
    972d3000 972d5480   SFEP     SFEP.sys     Fri Aug 03 08:36:08 2007 (46B2BEC8)
    972c3000 972c6980   SonyPI   SonyPI.sys   Fri Aug 03 08:41:08 2007 (46B2BFF4)
    8ba00000 8ba08000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    ad73d000 ad78e000   srv      srv.sys      Tue Jul 14 02:15:10 2009 (4A5BBFFE)
    ad6ee000 ad73d000   srv2     srv2.sys     Tue Jul 14 02:14:52 2009 (4A5BBFEC)
    ad6c0000 ad6e1000   srvnet   srvnet.sys   Tue Jul 14 02:14:45 2009 (4A5BBFE5)
    973a0000 973a1380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    9738f000 97395600   taphss   taphss.sys   Wed Sep 09 23:55:14 2009 (4AA81632)
    8ba38000 8bb81000   tcpip    tcpip.sys    Tue Jul 14 02:13:18 2009 (4A5BBF8E)
    ad6e1000 ad6ee000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
    908ec000 908f7000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    908d5000 908ec000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    90e0e000 90e1e000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    972c7000 972d3000   tpm      tpm.sys      Tue Jul 14 02:12:52 2009 (4A5BBF74)
    82920000 82929000   TSDDD    TSDDD.dll    unavailable (00000000)
    9000f000 90030000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    973d6000 973e4000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    c1272000 c1280000   usbaapl  usbaapl.sys  Fri Jul 17 21:57:03 2009 (4A60C97F)
    82172000 82189000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    82189000 8218a700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    91fe0000 91fef000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    90110000 90154000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    900c5000 90110000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    91fd5000 91fe0000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
    8218b000 821aeb00   usbvideo usbvideo.sys Tue Jul 14 02:51:51 2009 (4A5BC897)
    8b52f000 8b53a000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    9086a000 90876000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    90046000 90053000   vgapnp   vgapnp.sys   Tue Jul 14 02:25:49 2009 (4A5BC27D)
    90876000 90897000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    8bbb2000 8bbba380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    8b55e000 8b56e000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8b56e000 8b5b9000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    8bbbb000 8bbfa000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    81e37000 81e74000   VSTAZL3  VSTAZL3.SYS  Thu Oct 16 03:30:03 2008 (48F68B0B)
    8203e000 820f3000   VSTCNXT3 VSTCNXT3.SYS Thu Oct 16 03:29:13 2008 (48F68AD9)
    81e74000 81f76000   VSTDPV3  VSTDPV3.SYS  Thu Oct 16 03:32:04 2008 (48F68B84)
    908f7000 9090a000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    90897000 908a4000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    8b42d000 8b49e000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    8b49e000 8b4ac000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    913cb000 913d2000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    826c0000 8290a000   win32k   win32k.sys   unavailable (00000000)
    821f6000 821fe880   WinUSB   WinUSB.sys   Tue Jul 14 02:51:11 2009 (4A5BC86F)
    972dc000 972e5000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
    8b4f4000 8b4fd000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    821ca000 821e4000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
    82000000 82020480   WUDFRd   WUDFRd.sys   Tue Jul 14 02:50:44 2009 (4A5BC854)
    
    Unloaded modules:
    c1208000 c1272000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    82035000 8203d000   LHidFilt.Sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    96c81000 96c89000   LMouFilt.Sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    96e00000 96e13000   HIDCLASS.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    81e12000 81e2d000   hidbth.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0001B000
    96c76000 96c81000   mouhid.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    96dd5000 96ded000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    82148000 82151000   WinUSB.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    82151000 82172000   WUDFRd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00021000
    8b9a3000 8b9b0000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    8b9b0000 8b9bb000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    8b9bb000 8b9c5000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    8b9c5000 8b9d6000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
      My Computer


  3. Posts : 33
    [OEM] Win Vista Business > upgraded to Win 7 Ultimate 32bit
    Thread Starter
       #3

    acutally kasp is uninstalled alraedy a while ago...
    n everything its up to date ...
    welll i went to device manager n right click the drivers n search for updates online...
    saids its already up to date.....(best software its already installed...)

    the blue screen its cuase by
    USBHUB.SYS?????

    Last edited by ching1206; 27 Oct 2010 at 09:11.
      My Computer


  4. Posts : 185
    Windows 7 Ultimate 32bit
       #4

    Could you download this and scan it on both the cleaner and the reg.cleaner and let me know how many errors it picked up on reg scan...... CCleaner - Free software downloads and software reviews - CNET Download.com
      My Computer


  5. Posts : 33
    [OEM] Win Vista Business > upgraded to Win 7 Ultimate 32bit
    Thread Starter
       #5

    here is the log
    log rar

    please check it out n see whts up?
      My Computer


  6. Posts : 507
    Windows 7 Ultimate x64 SP1
       #6

    Follow this link to collect new data
    Code:
    https://www.sevenforums.com/crashes-debugging/96879-blue-screen-death-bsod-posting-instructions.html

      My Computer


  7. Posts : 17,796
    Windows 10, Home Clean Install
       #7

    There is one important thing that you have not been told. I am do many BSODs

    They are like a puzzle, each a little piece. Very rarely does one give a definitive answer. Continue to post your Dump reports and the mystery will be solved. Please just have patience.
    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  8. Posts : 5
    Win 7 Ult x86
       #8

    mpfilt.sys Tue Nov 01 07:58:46 2005
    This is a driver from AlcorMP. Download that program (any version), run LoadDriver.exe and click UNSTALL. It should solve all your problems.
      My Computer


  9. Posts : 33
    [OEM] Win Vista Business > upgraded to Win 7 Ultimate 32bit
    Thread Starter
       #9

    Averon said:
    mpfilt.sys Tue Nov 01 07:58:46 2005
    This is a driver from AlcorMP. Download that program (any version), run LoadDriver.exe and click UNSTALL. It should solve all your problems.

    i dont trust this dude...
    1 post...n tell me to download a exe?????
    OK../?????

    comfirm this a spyware or virus??
      My Computer


  10. Posts : 17,796
    Windows 10, Home Clean Install
       #10

    He has one post. I would not try it.

    Mpfilt.sys with description mpfilt.sys is a driver file from an unknown company belonging to an unknown product.
    In total there are 1 launchpoints for this file .
    There are 1 different variations of the file in our database and the file is not digitally signed.
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:20.
Find Us