Windows 7 Boot BSOD

clone

New Member
Hello everyone,

so yeah I'd need a little help with BSOD I am getting. I get it during the very beginning of boot (every time) and when trying to enter safe mode, I get the same BSOD after classpnp.sys is loaded.

When running the repair console, I get the message that the problem cannot be resolved (with the option to send it microsoft), where one of the signatures is 'corruptAcl'. I have spent quite a while now trying to figure out how to diagnose and fix corrupt acls but haven't found anything sensible yet. As for any log files/dumps, I should be able to post these later this evening.

I am also fairly certain what happened, couple of days ago I connected the harddrive in question to a laptop as an external HDD. When trying to access one of the user files, it got a prompt about changing file permissions, and assumed that those would only be temporary. Well anyway that is my guess why I get the BSOD, but I'm opened to any other suggestions and solutions of course...

One more thing, where I can find the ntbtlog.txt and the repair console log in full?

Thanks for the help

P.S - forgot to mention that after the repair console is finished, the system integrity check test returns error 0x490 (even after running chkdsk)
 

Attachments

  • dumps.zip
    46.1 KB · Views: 252
Last edited:
Welcome,

C:\Windows\Minidump

Copy the files in there to another folder. Zip them then attach the zip to a post.
 
Unfortunately as I listed before I cannot enter the safe mode either, so that is not an option a the moment.
 
You could try using a Linux Live disc like Knoppix to boot to, to delete all Avast drivers. Then try to boot to Windows' safe mode to use the tool.

If that doesn't work well, clean install Windows while formatting.

Drivers to delete at C:\Windows\System32\drivers:

Code:
91943000 91945b00   aswFsBlk aswFsBlk.SYS Mon Jun 28 16:32:32 2010 (4C2906E0)
9192c000 91943000   aswMonFlt aswMonFlt.sys Mon Jun 28 16:32:55 2010 (4C2906F7)
8c0b9000 8c0bd100   aswRdr   aswRdr.SYS   Mon Jun 28 16:33:12 2010 (4C290708)
8b89c000 8b8c2c00   aswSP    aswSP.SYS    Mon Jun 28 16:37:28 2010 (4C290808)
8c055000 8c05ec00   aswTdi   aswTdi.SYS   Mon Jun 28 16:37:50 2010 (4C29081E)
 
Try what's suggested in the post above.


You could try using a Linux Live disc like Knoppix to boot to, to delete all Avast drivers. Then try to boot to Windows' safe mode to use the tool.​


~~~~~

If you manage to boot,


090310-19000-01.dmp
BugCheck 1000008E, {c0000005, 81c6cd8a, a72f9abc, 0}
MEMORY_CORRUPTION_PATCH_aswSP

090510-37533-01.dmp
BugCheck A, {89b6b824, 0, 0, 81a8a9b5}
PROCESS_NAME: LogonUI.exe
0xA_nt!KiTrap0E+2cf


1. Replace Avast with MSE.

2. Update these very old drivers:

giveio.sys Thu Apr 04 05:33:25 1996
give IO access
Analog devices inc.

speedfan.sys Sun Sep 24 16:28:47 2006
Speedfan


3. Also check for updates:

RTL8187Se.sys Thu Oct 29 05:24:06 2009
Realtek RTL8187S Wireless LAN PCIE Network Adapter

igdkmd32.sys Wed Sep 23 22:18:09 2009
Intel GMA




Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\090310-19000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x81a4a000 PsLoadedModuleList = 0x81b92810
Debug session time: Fri Sep  3 14:02:28.975 2010 (GMT-33)
System Uptime: 1 days 3:14:06.678
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 81c6cd8a, a72f9abc, 0}

Unable to load image \SystemRoot\System32\Drivers\aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Probably caused by : aswSP.SYS

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 81c6cd8a, The address that the exception occurred at
Arg3: a72f9abc, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!ObInsertObjectEx+97
81c6cd8a f6402a08        test    byte ptr [eax+2Ah],8

TRAP_FRAME:  a72f9abc -- (.trap 0xffffffffa72f9abc)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=a72f9cf4 edx=00000000 esi=a72f9ca4 edi=a72f9cbc
eip=81c6cd8a esp=a72f9b30 ebp=a72f9ca0 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ObInsertObjectEx+0x97:
81c6cd8a f6402a08        test    byte ptr [eax+2Ah],8       ds:0023:0000002a=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x8E

PROCESS_NAME:  winamp.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 81c6ccea to 81c6cd8a

STACK_TEXT:  
a72f9ca0 81c6ccea 00000000 001f0003 00000000 nt!ObInsertObjectEx+0x97
a72f9cbc 81cab723 83b1c220 00000000 001f0003 nt!ObInsertObject+0x1e
a72f9d18 81a8d44a 00000000 001f0003 01d3ef90 nt!NtCreateEvent+0xba
a72f9d18 777564f4 00000000 001f0003 01d3ef90 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01d3efb0 00000000 00000000 00000000 00000000 0x777564f4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    81c6ccf3-81c6ccf7  5 bytes - nt!ObInsertObjectEx
    [ 8b ff 55 8b ec:e9 da d2 7e 09 ]
5 errors : !nt (81c6ccf3-81c6ccf7)

MODULE_NAME: aswSP

IMAGE_NAME:  aswSP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4c290808

FOLLOWUP_NAME:  MachineOwner

MEMORY_CORRUPTOR:  PATCH_aswSP

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_PATCH_aswSP

BUCKET_ID:  MEMORY_CORRUPTION_PATCH_aswSP

Followup: MachineOwner
---------

0: kd> lmvm aswSP
start    end        module name
8b447000 8b46dc00   aswSP    T (no symbols)           
    Loaded symbol image file: aswSP.SYS
    Image path: \SystemRoot\System32\Drivers\aswSP.SYS
    Image name: aswSP.SYS
    Timestamp:        Mon Jun 28 23:37:28 2010 (4C290808)
    CheckSum:         00038508
    ImageSize:        00026C00
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\090510-37533-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x81a03000 PsLoadedModuleList = 0x81b4b810
Debug session time: Fri Sep  3 14:04:09.514 2010 (GMT-5)
System Uptime: 0 days 0:00:31.202
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {89b6b824, 0, 0, 81a8a9b5}

Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+2cf )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 89b6b824, memory referenced
Arg2: 00000000, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81a8a9b5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 81b6b718
Unable to read MiSystemVaType memory at 81b4b160
 89b6b824 

CURRENT_IRQL:  0

FAULTING_IP: 
nt!MmAccessFault+21b6
81a8a9b5 0b0cd564b7b681  or      ecx,dword ptr nt!MmProtectToPteMask+0x4 (81b6b764)[edx*8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  LogonUI.exe

TRAP_FRAME:  8fc83c3c -- (.trap 0xffffffff8fc83c3c)
ErrCode = 00000000
eax=0005970a ebx=835c8518 ecx=00000000 edx=01000018 esi=835c8518 edi=85632030
eip=81a8a9b5 esp=8fc83cb0 ebp=8fc83d1c iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!MmAccessFault+0x21b6:
81a8a9b5 0b0cd564b7b681  or      ecx,dword ptr nt!MmProtectToPteMask+0x4 (81b6b764)[edx*8] ds:0023:89b6b824=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 81a8a9b5 to 81a4982b

STACK_TEXT:  
8fc83c3c 81a8a9b5 badb0d00 01000018 8fc83cb8 nt!KiTrap0E+0x2cf
8fc83d1c 81a49638 00000000 71e39dc0 00000001 nt!MmAccessFault+0x21b6
8fc83d1c 71e39dc0 00000000 71e39dc0 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
02effd24 00000000 00000000 00000000 00000000 0x71e39dc0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiTrap0E+2cf
81a4982b 833dc46ab68100  cmp     dword ptr [nt!KiFreezeFlag (81b66ac4)],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiTrap0E+2cf

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac

FAILURE_BUCKET_ID:  0xA_nt!KiTrap0E+2cf

BUCKET_ID:  0xA_nt!KiTrap0E+2cf

Followup: MachineOwner
---------









start    end        module name
818d3000 818db000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
81a03000 81e13000   nt       ntkrpamp.exe Sat Jun 19 06:55:24 2010 (4C1C3FAC)
81e13000 81e4a000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
87c00000 87c0e000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
87c10000 87c88000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
87c88000 87c99000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
87c99000 87ca1000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
87ca1000 87ce3000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
87ce3000 87d8e000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
87d8e000 87dff000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
87e0f000 87e57000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
87e57000 87e60000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
87e60000 87e68000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
87e68000 87e92000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
87e92000 87e9d000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
87e9d000 87eae000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
87eae000 87eb6000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
87eb6000 87ec1000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
87ec1000 87ed1000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
87ed1000 87f1c000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
87f1c000 87f23000   intelide intelide.sys Tue Jul 14 02:11:19 2009 (4A5BBF17)
87f23000 87f31000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
87f31000 87f47000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
87f47000 87f50000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
87f50000 87f73000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
87f73000 87f7c000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
87f7c000 87fb0000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
87fb0000 87fc1000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
87fc1000 87fe2000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
87fe2000 87ff0000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
88000000 8800e000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8800e000 88017000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
88017000 8801f000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8801f000 88027000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
88027000 88032000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
88033000 88162000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
88162000 8818d000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8818d000 881a0000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
881a0000 881fd000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
88200000 8820c000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
8820c000 88219000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
88219000 88221000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
88223000 882da000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
882da000 88318000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
88318000 8833d000   ksecpkg  ksecpkg.sys  Fri Dec 11 06:04:22 2009 (4B21C4C6)
8833d000 8834d000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8834d000 88355000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
88355000 88387000   fvevol   fvevol.sys   Sat Sep 26 05:24:21 2009 (4ABD7B55)
88387000 88398000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
88398000 883bd000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
883ef000 883f6000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
883f6000 883fd000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
88402000 8854b000   tcpip    tcpip.sys    Mon Jun 14 06:36:59 2010 (4C15A3DB)
8854b000 8857c000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8857c000 88584380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
88585000 885c4000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
885c4000 885cc000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
885cc000 885cd480   speedfan speedfan.sys Sun Sep 24 16:28:47 2006 (4516880F)
885ce000 885fb000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
885fb000 885fb680   giveio   giveio.sys   Thu Apr 04 05:33:25 1996 (316334F5)
8b812000 8b876000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
8b876000 8b88e000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
8b88e000 8b89c000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
8b89c000 8b8c2c00   aswSP    aswSP.SYS    Mon Jun 28 23:37:28 2010 (4C290808)
8b8c3000 8b8e4000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
8b8e4000 8b91d000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
8b91d000 8b95c000   Rt86win7 Rt86win7.sys Sat Dec 19 11:11:16 2009 (4B2C98B4)
8b95c000 8b9bf000   RTL8187Se RTL8187Se.sys Thu Oct 29 05:24:06 2009 (4AE90AD6)
8ba02000 8ba4d000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
8ba4d000 8ba5c000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
8ba5c000 8ba74000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
8ba74000 8ba81000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8ba81000 8ba8e000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
8ba8e000 8ba91700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8ba92000 8ba9b000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
8ba9b000 8baad000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
8baad000 8baba000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
8baba000 8bacc000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
8bacc000 8bae4000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
8bae4000 8baef000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
8baef000 8bb11000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
8bb11000 8bb29000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
8bb29000 8bb40000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
8bb40000 8bb57000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
8bb57000 8bb61000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
8bb61000 8bb62380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
8bb63000 8bb97000   ks       ks.sys       Tue Jul 14 02:45:13 2009 (4A5BC709)
8bb97000 8bba5000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
8bba5000 8bbe9000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
8bbe9000 8bbfa000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
8c033000 8c04a000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8c04a000 8c055000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8c055000 8c05ec00   aswTdi   aswTdi.SYS   Mon Jun 28 23:37:50 2010 (4C29081E)
8c05f000 8c0b9000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
8c0b9000 8c0bd100   aswRdr   aswRdr.SYS   Mon Jun 28 23:33:12 2010 (4C290708)
8c0be000 8c0f0000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
8c0f0000 8c0f7000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
8c0f7000 8c116000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
8c116000 8c127000   vwififlt vwififlt.sys Tue Jul 14 02:52:03 2009 (4A5BC8A3)
8c127000 8c135000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
8c135000 8c148000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
8c148000 8c158000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
8c158000 8c199000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8c199000 8c1a3000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8c1a3000 8c1ad000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8c1ad000 8c1b9000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8c600000 8c61f000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
8c61f000 8c629000   vwifibus vwifibus.sys Tue Jul 14 02:52:02 2009 (4A5BC8A2)
8c629000 8c634000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
8c636000 8cb3f000   igdkmd32 igdkmd32.sys Wed Sep 23 22:18:09 2009 (4ABA7471)
8cb3f000 8cbf6000   dxgkrnl  dxgkrnl.sys  Fri Oct 02 03:48:33 2009 (4AC54DE1)
8ed40000 8ef8a000   win32k   win32k.sys   Sat Jun 19 07:06:50 2010 (4C1C425A)
8efa0000 8efa9000   TSDDD    TSDDD.dll    unavailable (00000000)
8efd0000 8efee000   cdd      cdd.dll      Tue Jul 14 04:04:18 2009 (4A5BD992)
91819000 91869000   HdAudio  HdAudio.sys  Tue Jul 14 02:51:46 2009 (4A5BC892)
91869000 91898000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
91898000 918b1000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
918b1000 918be000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
918be000 918c8000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
918c8000 918d3000   dump_dumpata dump_dumpata.sys Tue Jul 14 02:11:16 2009 (4A5BBF14)
918d3000 918ea000   USBSTOR  USBSTOR.SYS  Tue Jul 14 02:51:19 2009 (4A5BC877)
918ea000 918eb700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
918ec000 918f5000   dump_atapi dump_atapi.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
918f5000 91906000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
91906000 91911000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
91911000 9192c000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
9192c000 91943000   aswMonFlt aswMonFlt.sys Mon Jun 28 23:32:55 2010 (4C2906F7)
91943000 91945b00   aswFsBlk aswFsBlk.SYS Mon Jun 28 23:32:32 2010 (4C2906E0)
91946000 91960000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
91960000 91970000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
91970000 919b6000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
919b6000 919c6000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
919c6000 919d9000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)

Unloaded modules:
883bd000 883ca000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
883ca000 883d5000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
883d5000 883de000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
883de000 883ef000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
88200000 8821f000   cdrom.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
 
Last edited:
Tried to delete the drivers you listed, but the situation hasn't changed at all... Is there any easy way to restore acls of the files to defaults?
 
Back
Top