Problem Devices:
Code:
Microsoft ISATAP Adapter ROOT\*ISATAP\0000 This device cannot start.
Microsoft Teredo Tunneling Adapter ROOT\*TEREDO\0000 This device cannot start.
Security Software (this is just to check it is installed and working; nothing needs to be done with this information at this time):
Code:
mbamgui.exe c:\malwarebytes anti-malware\malwarebytes' anti-malware\mbamgui.exe 3544 8 200 1380 09/04/2012 07:38 p.m. Not Available Not Available Not Available
mbamservice.exe c:\malwarebytes anti-malware\malwarebytes' anti-malware\mbamservice.exe 4796 8 80 80 09/04/2012 07:39 p.m. Not Available Not Available Not Available
fsorsp.exe c:\program files (x86)\f-secure\apps\ccf_reputation\fsorsp.exe 1836 8 200 1380 09/04/2012 07:37 p.m. 1.0.24.1358 59.69 KB (61,120 bytes) 12/12/2011 11:27 a.m.
fsgk32.exe c:\program files (x86)\f-secure\apps\computersecurity\anti-virus\fsgk32.exe 1896 8 200 1380 09/04/2012 07:37 p.m. 10.60.17500.39 535.66 KB (548,520 bytes) 31/03/2012 08:35 p.m.
fssm32.exe c:\program files (x86)\f-secure\apps\computersecurity\anti-virus\fssm32.exe 2896 8 200 1380 09/04/2012 07:37 p.m. 10.60.17500.39 991.66 KB (1,015,464 bytes) 31/03/2012 08:35 p.m.
fshdll64.exe c:\program files (x86)\f-secure\apps\computersecurity\common\fshdll64.exe 3024 8 200 1380 09/04/2012 07:37 p.m. 8.30.43089.0 103.15 KB (105,624 bytes) 31/03/2012 08:35 p.m.
fsm32.exe c:\program files (x86)\f-secure\apps\computersecurity\common\fsm32.exe 3488 8 200 1380 09/04/2012 07:38 p.m. 8.30.43089.0 303.65 KB (310,936 bytes) 31/03/2012 08:35 p.m.
fsma32.exe c:\program files (x86)\f-secure\apps\computersecurity\common\fsma32.exe 2284 8 200 1380 09/04/2012 07:37 p.m. 8.30.43089.0 207.65 KB (212,632 bytes) 31/03/2012 08:35 p.m.
fsdfwd.exe c:\program files (x86)\f-secure\apps\computersecurity\fwes\program\fsdfwd.exe 1500 8 200 1380 09/04/2012 07:37 p.m. 6.30.194.0 898.65 KB (920,216 bytes) 31/03/2012 08:35 p.m.
fsscoepl_x64.exe c:\program files (x86)\f-secure\apps\computersecurity\spam control\fsscoepl_x64.exe 3892 8 200 1380 09/04/2012 07:38 p.m. 1.2.8960.0 55.65 KB (56,984 bytes) 31/03/2012 08:35 p.m.
fshoster32.exe c:\program files (x86)\f-secure\fshoster32.exe 1728 6 200 1380 09/04/2012 07:37 p.m. 1.3.30510.0 157.47 KB (161,248 bytes) 28/02/2012 11:56 a.m.
fshoster32.exe c:\program files (x86)\f-secure\fshoster32.exe 3472 8 200 1380 09/04/2012 07:38 p.m. 1.3.30510.0 157.47 KB (161,248 bytes) 28/02/2012 11:56 a.m.
Problematic software:
Code:
ascservice.exe c:\avanced systemcare\advanced systemcare 5\ascservice.exe 792 13 200 1380 09/04/2012 07:37 p.m. 5.0.0.39 892.34 KB (913,752 bytes) 07/04/2012 04:12 p.m.
asctray.exe c:\avanced systemcare\advanced systemcare 5\asctray.exe 3332 8 200 1380 09/04/2012 07:38 p.m. 5.2.0.257 560.84 KB (574,296 bytes) 07/04/2012 04:12 p.m.
Many of us on the forums actually do not recommend automated optimization tools for Windows 7. Windows 7 does a much better job of handling its own optimization than its predecessors did. We especially do not recommend registry cleaning as an "optimization" step because automated registry cleaning causes more harm to the registry than it actually repairs.
In the future, if you need help optimizing Windows 7, please post a thread in
Performance & Maintenance - Windows 7 Forums or follow the tutorial enclosed in that forum to
Optimize Windows 7[2]=Performance%20Maintenance.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\SkidRow\Windows_NT6_BSOD_jcgriff2\040912-28953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`03001000 PsLoadedModuleList = 0xfffff800`03245650
Debug session time: Mon Apr 9 18:35:45.999 2012 (UTC - 6:00)
System Uptime: 0 days 8:14:54.809
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {5, 2, 1, fffff88004d7e558}
Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpIrpMajorRead+20c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000005, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88004d7e558, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af100
0000000000000005
CURRENT_IRQL: 2
FAULTING_IP:
HIDCLASS!HidpIrpMajorRead+20c
fffff880`04d7e558 83bb4401000001 cmp dword ptr [rbx+144h],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b4b0 -- (.trap 0xfffff88002f8b4b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d7e558 rsp=fffff88002f8b640 rbp=fffffa800517cc40
r8=fffffa80061b6830 r9=0000000000000000 r10=fffffa80061b6830
r11=fffffa80061b64a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
HIDCLASS!HidpIrpMajorRead+0x20c:
fffff880`04d7e558 83bb4401000001 cmp dword ptr [rbx+144h],1 ds:0001:00000000`00000144=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000307d2e9 to fffff8000307dd40
STACK_TEXT:
fffff880`02f8b368 fffff800`0307d2e9 : 00000000`0000000a 00000000`00000005 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f8b370 fffff800`0307bf60 : 00000000`000025ac fffff880`0447df5d fffffa80`05bf1100 fffffa80`061b6480 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b4b0 fffff880`04d7e558 : 00000000`0000000b fffff880`04d854a0 fffff880`04d854a0 fffff880`04d7b311 : nt!KiPageFault+0x260
fffff880`02f8b640 fffff880`04d7b8ed : fffff880`04d863b8 fffff880`04d854a0 fffffa80`061cbab0 fffffa80`061cbad0 : HIDCLASS!HidpIrpMajorRead+0x20c
fffff880`02f8b6e0 fffff880`04dabe19 : 00000000`00000000 00000000`00000000 fffffa80`061b7010 fffffa80`061c7190 : HIDCLASS!HidpMajorHandler+0x1dd
fffff880`02f8b750 fffff880`04dabcd1 : 00000000`00000000 00000000`ffffffff fffffa80`061c8990 fffffa80`061c7190 : mouhid!MouHid_StartRead+0xd1
fffff880`02f8b7a0 fffff800`030817d1 : fffffa80`061b7293 fffff880`00000000 fffffa80`00000001 fffff880`00000000 : mouhid!MouHid_ReadComplete+0x6f5
fffff880`02f8b820 fffff880`04d7d9c4 : fffffa80`061a59e0 fffffa80`061a5906 fffffa80`061b6400 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`02f8b910 fffff880`04d7dc2d : fffffa80`061b7b02 fffffa80`061b7b20 fffffa80`061b64a0 00000000`00000004 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff880`02f8b9a0 fffff800`030817d1 : fffffa80`04d87a53 00000000`00000000 fffffa80`061b6301 fffffa80`04d87860 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff880`02f8ba30 fffff880`0448a631 : fffffa80`05136050 fffffa80`05cb0000 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`02f8bb20 fffff880`0448ab0f : fffffa80`076a0802 fffffa80`04d87860 00000000`ffffffff fffffa80`05136eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0448866f : fffffa80`05136eb0 fffffa80`051361a0 fffffa80`05137050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04479f89 : fffffa80`05136050 00000000`00000000 fffffa80`05136e02 fffffa80`05136eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`0308851c : fffff880`02f63180 fffffa80`05136eb0 fffffa80`05136ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`03075a6a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000000 fffff880`04479db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
HIDCLASS!HidpIrpMajorRead+20c
fffff880`04d7e558 83bb4401000001 cmp dword ptr [rbx+144h],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: HIDCLASS!HidpIrpMajorRead+20c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a665
FAILURE_BUCKET_ID: X64_0xD1_HIDCLASS!HidpIrpMajorRead+20c
BUCKET_ID: X64_0xD1_HIDCLASS!HidpIrpMajorRead+20c
Followup: MachineOwner
---------
Problem is most likely caused by a Human Interface Device, USB device, or the USB ports themselves. Often, this crash occurs due to Bluetooth. If you open device manager and look under Human Interface Devices, what do you see? To open device manager:
- First, download the latest driver. Then do the next steps.
- Click Start Menu
- Right Click My Computer/Computer
- Click Manage
- Click Device Manager from the list on the left
Alternatively:
- Login as an adminstrative user.
- First, download the latest driver. Then do the next steps.
- Click Start Menu
- Click Control Panel
- Click Hardware and Sound
- Click Device Manager (the last link under Devices and Printers)
Please
post a screenshot of what is under Human Interface Devices