Windows 7 bad pool header

Kathie Buffery

Extraordinary Member
Im having a nightmare of a weekend , my laptop has had a variety of problems from viruses which I seem to have got rid of to bsod twice , now i cant get in the pc at all can anyone help as I need my laptop for my buisness. :mad:
 
i can give you the information from the BSOD however , if u use it for business i would personally back up all important files and format the pc

any virus can cause loss of data, inability to access files or prevent you from using windows again,

may take u 2-3 hours to sort out but it would be well worth it :)
 
Thanks that would be great , the laptop wasnt loading last night , all work that needs to be backed up has been , any work that can be redone is fine , I have access to a lesser laptop , im angry that I have let a virus in .
:waah:
 
good honesty if u can format

u only get viruses REALLY

from naughrt websites, ( u get what i mean ), crack websites, which you should not really be using ( copyright etc etc)

dodgy downloads ( which most legit content isnt really dodgy)

im not assuming u have im just saying USUALLY LOL
 
Can you boot into safe mode? Or the WinRE where you can Repair your system? Do you have a recovery CD or Install DVD?

It may not help becuase folks that write those viruses seem to know how to disable a system.

I don't suppose you have made an image backup of your system?
 
I dont have a back up image unfortunatly , I can boot into safe mode . I dont have a recovery cd or install CD , does anyone give those out now. I havent been on any naughty websites etc .

Im just glad I can get into it on safe mode , not normal mode , if you can help it would be great ,. otherwise ill have to take it to the shop to be repaired if they can.

just tell me what I can do .

Dizz
 
Being in safe mode can be a good thing. You can probably get a dump file if one was made. There is a sticky on the BSOD forum that explains how to do that.

Pool problems are many times caused by a driver. Have you installed anything, or plugged in anything lately or do you know if any drivers have been updated? You might check the Device Manager to see if anything is showing a problem. If you removed items because of a virus repair, some of your system files may have been damaged or removed. Try opening an administrative command prompt window and type SFC /scannow which will check your system files and replace whatever it can.

If you see a device showing a yellow mark, if you cannot find a driver for it, you might be able to disable it to see if you can get back into normal Windows.

Also a utility called msconfig.exe is very useful during these times. You can set it to boot only certain parts of the system to see if you can narrow down the cause. We can discuss it after you check around your system. One thing it does is to allow for a boot log to be kept which you can get later and check. If you get one, attach it here if you like. It is called Ntbtlog.txt and will be in the Windows folder.
 
if u can get the minidump i can uncover the mystry to whats causing you the pain of the blue screen
 
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {474, 2, 1, 8348c86c}
Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+58 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000474, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8348c86c, address which referenced memory
Debugging Details:
------------------

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 83583718
Unable to read MiSystemVaType memory at 83563160
 00000474 
CURRENT_IRQL:  2
FAULTING_IP: 
nt!KiAttachProcess+58
8348c86c f00fc102        lock xadd dword ptr [edx],eax
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  System
TRAP_FRAME:  ae823b8c -- (.trap 0xffffffffae823b8c)
ErrCode = 00000002
eax=00000008 ebx=00000400 ecx=ac8796b0 edx=00000474 esi=ac879540 edi=ac879580
eip=8348c86c esp=ae823c00 ebp=ae823c0c iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!KiAttachProcess+0x58:
8348c86c f00fc102        lock xadd dword ptr [edx],eax ds:0023:00000474=????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from 8348c86c to 8346181b
STACK_TEXT:  
ae823b8c 8348c86c badb0d00 00000474 ae823c08 nt!KiTrap0E+0x2cf
ae823c0c 834af7de 00000400 00000000 ac8796b0 nt!KiAttachProcess+0x58
ae823c50 8345c87d badb0d00 ae823cc8 ae003c98 nt!KeStackAttachProcess+0xbe
ae823c60 834a5320 00000001 ac879540 835555bc nt!ZwOpenProcess+0x11
ae823d00 8348903b 80002a68 00000000 ac879540 nt!KiCheckForThreadDispatch+0x151
ae823d50 836299df 80000001 b3a01302 00000000 nt!ExpWorkerThread+0x10d
ae823d90 834db1d9 83488f2e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19

STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!KiAttachProcess+58
8348c86c f00fc102        lock xadd dword ptr [edx],eax
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!KiAttachProcess+58
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78ed4
FAILURE_BUCKET_ID:  0xA_nt!KiAttachProcess+58
BUCKET_ID:  0xA_nt!KiAttachProcess+58
Followup: MachineOwner
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 00050830
Arg2: 8cd67bc0
Arg3: 8cd677a0
Arg4: 8349a97b
Debugging Details:
------------------

EXCEPTION_RECORD:  8cd67bc0 -- (.exr 0xffffffff8cd67bc0)
ExceptionAddress: 8349a97b (nt!CcWriteBehind+0x000000ed)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 0000001c
Attempt to write to address 0000001c
CONTEXT:  8cd677a0 -- (.cxr 0xffffffff8cd677a0)
eax=00000000 ebx=adc44b04 ecx=0000001c edx=00000000 esi=adc44a58 edi=00000000
eip=8349a97b esp=8cd67c88 ebp=8cd67ca8 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!CcWriteBehind+0xed:
8349a97b f00fc101        lock xadd dword ptr [ecx],eax ds:0023:0000001c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
CURRENT_IRQL:  0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1:  00000001
EXCEPTION_PARAMETER2:  0000001c
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8356a718
Unable to read MiSystemVaType memory at 8354a160
 0000001c 
FOLLOWUP_IP: 
nt!CcWriteBehind+ed
8349a97b f00fc101        lock xadd dword ptr [ecx],eax
FAULTING_IP: 
nt!CcWriteBehind+ed
8349a97b f00fc101        lock xadd dword ptr [ecx],eax
BUGCHECK_STR:  0x34
DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER:  from 834a2fd6 to 8349a97b
STACK_TEXT:  
8cd67ca8 834a2fd6 8cd67cc4 91fb02af 8596a8f8 nt!CcWriteBehind+0xed
8cd67d00 8347003b 8596a8f8 00000000 883aed48 nt!CcWorkerThread+0x164
8cd67d50 836109df 80000000 91fb023f 00000000 nt!ExpWorkerThread+0x10d
8cd67d90 834c21d9 8346ff2e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19

SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  nt!CcWriteBehind+ed
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78ed4
STACK_COMMAND:  .cxr 0xffffffff8cd677a0 ; kb
FAILURE_BUCKET_ID:  0x34_nt!CcWriteBehind+ed
BUCKET_ID:  0x34_nt!CcWriteBehind+ed
Followup: MachineOwner
---------

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {474, 2, 1, 82ebb86c}
Probably caused by : ntkrpamp.exe ( nt!KiAttachProcess+58 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000474, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82ebb86c, address which referenced memory
Debugging Details:
------------------

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82fb2718
Unable to read MiSystemVaType memory at 82f92160
 00000474 
CURRENT_IRQL:  2
FAULTING_IP: 
nt!KiAttachProcess+58
82ebb86c f00fc102        lock xadd dword ptr [edx],eax
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  System
TRAP_FRAME:  91703b8c -- (.trap 0xffffffff91703b8c)
ErrCode = 00000002
eax=00000008 ebx=00000400 ecx=87fe32a0 edx=00000474 esi=87fe3130 edi=87fe3170
eip=82ebb86c esp=91703c00 ebp=91703c0c iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!KiAttachProcess+0x58:
82ebb86c f00fc102        lock xadd dword ptr [edx],eax ds:0023:00000474=????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from 82ebb86c to 82e9081b
STACK_TEXT:  
91703b8c 82ebb86c badb0d00 00000474 91703c08 nt!KiTrap0E+0x2cf
91703c0c 82ede7de 00000400 00000000 87fe32a0 nt!KiAttachProcess+0x58
91703c50 82e8b87d badb0d00 91703cc8 91003c88 nt!KeStackAttachProcess+0xbe
91703d00 82eb803b 800029c4 00000000 87fe3130 nt!ZwOpenProcess+0x11
91703d50 830589df 80000001 8c650d49 00000000 nt!ExpWorkerThread+0x10d
91703d90 82f0a1d9 82eb7f2e 80000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19

STACK_COMMAND:  kb
FOLLOWUP_IP: 
nt!KiAttachProcess+58
82ebb86c f00fc102        lock xadd dword ptr [edx],eax
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  nt!KiAttachProcess+58
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: nt
IMAGE_NAME:  ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP:  4cc78ed4
FAILURE_BUCKET_ID:  0xA_nt!KiAttachProcess+58
BUCKET_ID:  0xA_nt!KiAttachProcess+58
Followup: MachineOwner
---------

hehe bless ya.. learn something every day :)

im not saying you will understand all the information above as i dont expect any one to understand this to be honest, ill add it so other members can see the informatoin of the dump files
 
Last edited:
i have also led at the drivers and the version numbers ( how old they are ) and some are pretty old,i would recommend updating your drivers for your chipset, graphics card so your pc is upto dat,e i would also ensure you have all of the windows serivce packs installed

if unsure where to look let me no :)

WELL DONE AGAIN :)
 
DRIVERS
Code:
start    end        module name
83402000 83812000   nt       ntkrpamp.exe Wed Oct 27 03:30:44 2010 (4CC78ED4)
83812000 83849000   hal      halmacpi.dll Tue Jul 14 00:11:03 2009 (4A5BBF07)
83a0b000 83a83000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 02:06:41 2009 (4A5BDA21)
83a83000 83a94000   PSHED    PSHED.dll    Tue Jul 14 02:09:36 2009 (4A5BDAD0)
83a94000 83a9c000   BOOTVID  BOOTVID.dll  Tue Jul 14 02:04:34 2009 (4A5BD9A2)
83a9c000 83ade000   CLFS     CLFS.SYS     Tue Jul 14 00:11:10 2009 (4A5BBF0E)
83ade000 83b89000   CI       CI.dll       Tue Jul 14 02:09:28 2009 (4A5BDAC8)
83b89000 83bfa000   Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
83c05000 83c13000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:11:25 2009 (4A5BBF1D)
83c13000 83c5b000   ACPI     ACPI.sys     Tue Jul 14 00:11:11 2009 (4A5BBF0F)
83c5b000 83c64000   WMILIB   WMILIB.SYS   Tue Jul 14 00:11:22 2009 (4A5BBF1A)
83c64000 83c6c000   msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
83c6c000 83c96000   pci      pci.sys      Tue Jul 14 00:11:16 2009 (4A5BBF14)
83c96000 83ca1000   vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
83ca1000 83cb2000   partmgr  partmgr.sys  Tue Jul 14 00:11:35 2009 (4A5BBF27)
83cb2000 83cba000   compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
83cba000 83cc5000   BATTC    BATTC.SYS    Tue Jul 14 00:19:15 2009 (4A5BC0F3)
83cc5000 83cd5000   volmgr   volmgr.sys   Tue Jul 14 00:11:25 2009 (4A5BBF1D)
83cd5000 83d20000   volmgrx  volmgrx.sys  Tue Jul 14 00:11:41 2009 (4A5BBF2D)
83d20000 83d36000   mountmgr mountmgr.sys Tue Jul 14 00:11:27 2009 (4A5BBF1F)
83d36000 83d3d000   pciide   pciide.sys   Tue Jul 14 00:11:19 2009 (4A5BBF17)
83d3d000 83d4b000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:11:15 2009 (4A5BBF13)
83d4b000 83d7f000   fltmgr   fltmgr.sys   Tue Jul 14 00:11:13 2009 (4A5BBF11)
83d7f000 83d90000   fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
83d90000 83ded000   cng      cng.sys      Tue Jul 14 00:32:55 2009 (4A5BC427)
83e00000 83e09000   amdxata  amdxata.sys  Fri Mar 19 16:19:01 2010 (4BA3A3F5)
83e13000 83fc6000   iaStor   iaStor.sys   Fri Oct 02 20:38:45 2009 (4AC656C5)
83fc6000 83fcf000   atapi    atapi.sys    Tue Jul 14 00:11:15 2009 (4A5BBF13)
83fcf000 83ff2000   ataport  ataport.SYS  Tue Jul 14 00:11:18 2009 (4A5BBF16)
83ff2000 83ffc000   msahci   msahci.sys   Tue Jul 14 00:45:50 2009 (4A5BC72E)
88110000 88118000   kdcom    kdcom.dll    Tue Jul 14 02:08:58 2009 (4A5BDAAA)
89000000 89032000   fvevol   fvevol.sys   Sat Sep 26 03:24:21 2009 (4ABD7B55)
8903c000 8916b000   Ntfs     Ntfs.sys     Fri Mar 11 03:29:11 2011 (4D799707)
8916b000 89196000   msrpc    msrpc.sys    Tue Jul 14 00:11:59 2009 (4A5BBF3F)
89196000 891a9000   ksecdd   ksecdd.sys   Tue Jul 14 00:11:56 2009 (4A5BBF3C)
891a9000 891b7000   pcw      pcw.sys      Tue Jul 14 00:11:10 2009 (4A5BBF0E)
891b7000 891c0000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:11:14 2009 (4A5BBF12)
891c0000 891cbb00   RapportKELL RapportKELL.sys Thu Apr 28 12:33:26 2011 (4DB95086)
891cc000 891dc000   mup      mup.sys      Tue Jul 14 00:14:14 2009 (4A5BBFC6)
891dc000 891ed000   disk     disk.sys     Tue Jul 14 00:11:28 2009 (4A5BBF20)
89200000 8922d000   rdyboost rdyboost.sys Tue Jul 14 00:22:02 2009 (4A5BC19A)
89232000 892e9000   ndis     ndis.sys     Tue Jul 14 00:12:24 2009 (4A5BBF58)
892e9000 89327000   NETIO    NETIO.SYS    Tue Jul 14 00:12:35 2009 (4A5BBF63)
89327000 8934c000   ksecpkg  ksecpkg.sys  Fri Dec 11 04:04:22 2009 (4B21C4C6)
8934c000 89354380   vmstorfl vmstorfl.sys Tue Jul 14 00:28:44 2009 (4A5BC32C)
89355000 89394000   volsnap  volsnap.sys  Tue Jul 14 00:11:34 2009 (4A5BBF26)
89394000 89398100   TVALZ    TVALZ.SYS    Tue Jul 14 03:18:30 2009 (4A5BEAF6)
89399000 893e0000   tos_sps32 tos_sps32.sys Wed Jun 24 06:36:21 2009 (4A41BB55)
893e0000 893e1900   Thpevm   Thpevm.SYS   Mon Jun 29 09:15:50 2009 (4A487836)
893e2000 893ed000   thpdrv   thpdrv.sys   Mon Jun 29 03:03:26 2009 (4A4820EE)
893ed000 893f5000   spldr    spldr.sys    Mon May 11 17:13:47 2009 (4A084EBB)
893f5000 893fd000   hwpolicy hwpolicy.sys Tue Jul 14 00:11:01 2009 (4A5BBF05)
89409000 8942e000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
8942e000 89434500   avgrkx86 avgrkx86.sys Wed Mar 16 14:05:26 2011 (4D80C3A6)
89435000 89438f80   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 05:22:33 2011 (4D634819)
89439000 895ec000   dump_iaStor dump_iaStor.sys Fri Oct 02 20:38:45 2009 (4AC656C5)
8de23000 8de42000   cdrom    cdrom.sys    Tue Jul 14 00:11:24 2009 (4A5BBF1C)
8de42000 8deb2000   aswSnx   aswSnx.SYS   Tue May 10 13:03:53 2011 (4DC929A9)
8deb2000 8debe000   avgmfx86 avgmfx86.sys Tue Mar 01 12:23:55 2011 (4D6CE55B)
8debe000 8dec5000   Null     Null.SYS     Tue Jul 14 00:11:12 2009 (4A5BBF10)
8dec5000 8decc000   Beep     Beep.SYS     Tue Jul 14 00:45:00 2009 (4A5BC6FC)
8decc000 8ded8000   vga      vga.sys      Tue Jul 14 00:25:50 2009 (4A5BC27E)
8ded8000 8def9000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8def9000 8df06000   watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
8df06000 8df0e000   RDPCDD   RDPCDD.sys   Tue Jul 14 01:01:40 2009 (4A5BCAE4)
8df0e000 8df16000   rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8df16000 8df1e000   rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8df1e000 8df29000   Msfs     Msfs.SYS     Tue Jul 14 00:11:26 2009 (4A5BBF1E)
8df29000 8df37000   Npfs     Npfs.SYS     Tue Jul 14 00:11:31 2009 (4A5BBF23)
8df37000 8df7de80   avgtdix  avgtdix.sys  Mon Apr 04 22:53:24 2011 (4D9A3DD4)
8df7e000 8dfb0000   netbt    netbt.sys    Tue Jul 14 00:12:18 2009 (4A5BBF52)
8e627000 8e770000   tcpip    tcpip.sys    Mon Jun 14 04:36:59 2010 (4C15A3DB)
8e770000 8e7a1000   fwpkclnt fwpkclnt.sys Tue Jul 14 00:12:03 2009 (4A5BBF43)
8e7a1000 8e7b2000   avgfwd6x avgfwd6x.sys Mon Jul 12 02:37:25 2010 (4C3A71D5)
8e7b2000 8e7c9000   tdx      tdx.sys      Tue Jul 14 00:12:10 2009 (4A5BBF4A)
8e7c9000 8e7d4000   TDI      TDI.SYS      Tue Jul 14 00:12:12 2009 (4A5BBF4C)
8e7d4000 8e7ddf00   aswTdi   aswTdi.SYS   Tue May 10 13:02:35 2011 (4DC9295B)
8ea3b000 8ea95000   afd      afd.sys      Tue Jul 14 00:12:34 2009 (4A5BBF62)
8ea95000 8ea99200   aswRdr   aswRdr.SYS   Tue May 10 12:59:54 2011 (4DC928BA)
8ea9a000 8eaa1000   wfplwf   wfplwf.sys   Tue Jul 14 00:53:51 2009 (4A5BC90F)
8eaa1000 8eac0000   pacer    pacer.sys    Tue Jul 14 00:53:58 2009 (4A5BC916)
8eac0000 8ead1000   vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
8ead1000 8eadf000   netbios  netbios.sys  Tue Jul 14 00:53:54 2009 (4A5BC912)
8eadf000 8eaeea00   tosrfcom tosrfcom.sys Tue Jul 28 11:18:06 2009 (4A6ED05E)
8eaef000 8eb02000   wanarp   wanarp.sys   Tue Jul 14 00:55:02 2009 (4A5BC956)
8eb02000 8eb12000   termdd   termdd.sys   Tue Jul 14 01:01:35 2009 (4A5BCADF)
8eb12000 8eb53000   rdbss    rdbss.sys    Tue Jul 14 00:14:26 2009 (4A5BBFD2)
8eb53000 8eb78580   RapportPG RapportPG.sys Thu Apr 28 12:33:21 2011 (4DB95081)
8eb79000 8eb87c00   RapportEI RapportEI.sys Thu Apr 28 12:33:44 2011 (4DB95098)
8eb88000 8eb94800   RapportCerberus_26169 RapportCerberus_26169.sys Sun Apr 17 16:16:25 2011 (4DAB0449)
8eb95000 8eb9f000   nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
8eb9f000 8eba9000   mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8eba9000 8ebb5000   discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8ebb5000 8ebfb000   nwifi    nwifi.sys    Tue Jul 14 00:51:59 2009 (4A5BC89F)
8ee11000 8ee75000   csc      csc.sys      Tue Jul 14 00:15:08 2009 (4A5BBFFC)
8ee75000 8ee8d000   dfsc     dfsc.sys     Tue Jul 14 00:14:16 2009 (4A5BBFC8)
8ee8d000 8ee9b000   blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
8ee9b000 8eed6100   avgldx86 avgldx86.sys Fri Jan 07 04:35:29 2011 (4D269811)
8eed7000 8ef20180   aswSP    aswSP.SYS    Tue May 10 13:03:43 2011 (4DC9299F)
8ef42000 8ef63000   tunnel   tunnel.sys   Tue Jul 14 00:54:03 2009 (4A5BC91B)
8ef63000 8ef75000   intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
8ef75000 8efc0000   USBPORT  USBPORT.SYS  Tue Jul 14 00:51:13 2009 (4A5BC871)
8f600000 8f613000   rspndr   rspndr.sys   Tue Jul 14 00:53:20 2009 (4A5BC8F0)
8f62e000 8f680000   rixdpe86 rixdpe86.sys Sat Jul 04 10:37:06 2009 (4A4F22C2)
8f680000 8f697000   rassstp  rassstp.sys  Tue Jul 14 00:54:57 2009 (4A5BC951)
8f697000 8f6cb000   ks       ks.sys       Thu Mar 04 03:57:52 2010 (4B8F2FC0)
8f6cb000 8f6d9000   umbus    umbus.sys    Tue Jul 14 00:51:38 2009 (4A5BC88A)
8f6d9000 8f71d000   usbhub   usbhub.sys   Tue Jul 14 00:52:06 2009 (4A5BC8A6)
8f71d000 8f72e000   NDProxy  NDProxy.SYS  Tue Jul 14 00:54:27 2009 (4A5BC933)
8f72e000 8f76e000   udfs     udfs.sys     Tue Jul 14 00:14:09 2009 (4A5BBFC1)
8f76e000 8f789000   luafv    luafv.sys    Tue Jul 14 00:15:44 2009 (4A5BC020)
8f789000 8f7c1000   aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
8f7c1000 8f7db000   WudfPf   WudfPf.sys   Tue Jul 14 00:50:13 2009 (4A5BC835)
8f7db000 8f7eb000   lltdio   lltdio.sys   Tue Jul 14 00:53:18 2009 (4A5BC8EE)
8f7eb000 8f7fb000   ndisuio  ndisuio.sys  Tue Jul 14 00:53:51 2009 (4A5BC90F)
90200000 9021f000   HDAudBus HDAudBus.sys Tue Jul 14 00:50:55 2009 (4A5BC85F)
9021f000 90230000   risdpe86 risdpe86.sys Tue Jul 28 10:24:19 2009 (4A6EC3C3)
90234000 908ac000   igdkmd32 igdkmd32.sys Fri Nov 06 23:44:41 2009 (4AF4B4E9)
908ac000 90963000   dxgkrnl  dxgkrnl.sys  Tue Nov 02 02:37:53 2010 (4CCF7981)
90963000 9099c000   dxgmms1  dxgmms1.sys  Thu Feb 03 03:34:49 2011 (4D4A2259)
9099c000 909a6080   HECI     HECI.sys     Thu Sep 17 20:54:12 2009 (4AB293E4)
909a7000 909db000   e1k6232  e1k6232.sys  Thu Sep 24 01:09:54 2009 (4ABAB8D2)
909db000 909ea000   usbehci  usbehci.sys  Tue Jul 14 00:51:14 2009 (4A5BC872)
909ea000 909ff000   rimspe86 rimspe86.sys Thu Jul 02 00:50:14 2009 (4A4BF636)
91000000 91017000   raspptp  raspptp.sys  Tue Jul 14 00:54:47 2009 (4A5BC947)
91017000 91018380   swenum   swenum.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
9101f000 9169b000   NETw5s32 NETw5s32.sys Wed Jan 13 16:36:36 2010 (4B4DF694)
9169b000 916a5000   vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
916a5000 916b1000   tpm      tpm.sys      Tue Jul 14 00:12:52 2009 (4A5BBF74)
916b1000 916cb000   serial   serial.sys   Tue Jul 14 00:45:33 2009 (4A5BC71D)
916cb000 916d5000   serenum  serenum.sys  Tue Jul 14 00:45:27 2009 (4A5BC717)
916d5000 916ed000   i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
916ed000 916fa000   kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
916fa000 91735000   Apfiltr  Apfiltr.sys  Fri Nov 27 13:34:15 2009 (4B0FD557)
91735000 91742000   mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
91742000 9174c000   tdcmdpst tdcmdpst.sys Thu Jul 30 09:26:19 2009 (4A71592B)
9174c000 9176ab00   Impcd    Impcd.sys    Mon Oct 26 20:39:02 2009 (4AE608E6)
9176b000 91772000   TVALZFL  TVALZFL.sys  Fri Jun 19 11:27:46 2009 (4A3B6822)
91772000 91774600   tosrfec  tosrfec.sys  Mon Jun 01 07:58:51 2009 (4A237C2B)
91775000 91778700   CmBatt   CmBatt.sys   Tue Jul 14 00:19:18 2009 (4A5BC0F6)
91779000 91786000   CompositeBus CompositeBus.sys Tue Jul 14 00:45:26 2009 (4A5BC716)
91786000 91798000   AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
91798000 917b0000   rasl2tp  rasl2tp.sys  Tue Jul 14 00:54:33 2009 (4A5BC939)
917b0000 917bb000   ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
917bb000 917dd000   ndiswan  ndiswan.sys  Tue Jul 14 00:54:34 2009 (4A5BC93A)
917dd000 917f5000   raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
917f5000 917ff000   rdpbus   rdpbus.sys   Tue Jul 14 01:02:40 2009 (4A5BCB20)
92405000 926abf40   RTKVHDA  RTKVHDA.sys  Fri Oct 30 10:13:44 2009 (4AEABC58)
926ac000 926db000   portcls  portcls.sys  Tue Jul 14 00:51:00 2009 (4A5BC864)
926db000 926f4000   drmk     drmk.sys     Tue Jul 14 01:36:05 2009 (4A5BD2F5)
926f4000 9272e000   IntcDAud IntcDAud.sys Fri Oct 30 14:55:29 2009 (4AEAFE61)
9272e000 92738200   tosporte tosporte.sys Tue Jun 16 11:48:40 2009 (4A377888)
92739000 92750000   usbccgp  usbccgp.sys  Tue Jul 14 00:51:31 2009 (4A5BC883)
92750000 92751700   USBD     USBD.SYS     Tue Jul 14 00:51:05 2009 (4A5BC869)
92752000 92775b80   usbvideo usbvideo.sys Thu Mar 04 04:04:40 2010 (4B8F3158)
92776000 9277be00   pgeffect pgeffect.sys Mon Jun 22 10:04:57 2009 (4A3F4939)
9277c000 92786b80   tosrfusb tosrfusb.sys Fri Sep 11 10:37:04 2009 (4AAA1A40)
92787000 927af000   tosrfbd  tosrfbd.sys  Thu Sep 24 05:57:10 2009 (4ABAFC26)
927af000 927c1280   Tosrfhid Tosrfhid.sys Wed May 20 02:23:34 2009 (4A135B96)
927c2000 927cc000   Dxapi    Dxapi.sys    Tue Jul 14 00:25:25 2009 (4A5BC265)
927cc000 927d9000   crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
927d9000 927ea000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
927ea000 927f5000   monitor  monitor.sys  Tue Jul 14 00:25:58 2009 (4A5BC286)
927f5000 927f7b00   aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
97400000 97409000   TSDDD    TSDDD.dll    unavailable (00000000)
97430000 9744e000   cdd      cdd.dll      unavailable (00000000)
97450000 9749d000   ATMFD    ATMFD.DLL    unavailable (00000000)
975a0000 977eb000   win32k   win32k.sys   unavailable (00000000)
acc0b000 acc90000   HTTP     HTTP.sys     Tue Jul 14 00:12:53 2009 (4A5BBF75)
acc90000 acca9000   bowser   bowser.sys   Wed Feb 23 05:05:24 2011 (4D649594)
acca9000 accbb000   mpsdrv   mpsdrv.sys   Tue Jul 14 00:52:52 2009 (4A5BC8D4)
accbb000 accde000   mrxsmb   mrxsmb.sys   Wed Feb 23 05:05:29 2011 (4D649599)
accde000 acd19000   mrxsmb10 mrxsmb10.sys Wed Feb 23 05:05:39 2011 (4D6495A3)
acd19000 acd34000   mrxsmb20 mrxsmb20.sys Wed Feb 23 05:05:33 2011 (4D64959D)
acd4c000 acd4fb80   AVGIDSShim AVGIDSShim.Sys Thu Feb 10 04:59:09 2011 (4D53709D)
Unloaded modules:
acd34000 acd4c000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
89439000 89446000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
89446000 895f9000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  001B3000
891ed000 891fe000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
8ef21000 8ef42000   tunnel.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00021000

Ok plan of action for you

go to start

type in the search box above the start button

right click the black icon named command promt


click run as administrator

type in the box

sfc /scannow

let this process run,

after this has completed type

chkdsk /f /r

let this process complete

once they both have completed close the box

______________

update your graphics card drivers etc, make sure you have all of the latest windows service packs installed

to check what you have

go to start

right click my computer

click properties

this will load a page up, at the top it will say windows 7 and it will also say " service pack #" then a number , if it doesnt say service pack you may not have any installed, let me no what happens after you done all these :)

you can post back once you have done each of the commands if you wish
 
Last edited:
Okay it wont let me open the command prompt this is what i get

C:\windows\system32\command.com - c:\windows\system32\config\system~1\Appdata\local\temp\. A temporary file needed for initialisation could not be created or could not be written to .

This dont sound good :(
 
Just to make sure, to open the prompt you opened the start menu and typed cmd in the search box the hit CTRL+SHIFT Enter? Or after typing cmd in the search box, you right clicked on the cmd.exe icon above and selected "Run as Admin"?

After doing that, you got the message in the command prompt window you reference?
 
Well thanks to the above post I ran both sequences , I still cant get into the lapyop on normal mode only safe mode so I cant update drivers .
 
Doing them.commands would not affect the system at all . The commas are designed correcoe repair issues nt break it
 
Back
Top