Windows 7 Japanese Lang Pack BSOD while Installing

Luci Chan

New Member
Okay, so, I have this brand new computer. I'm completely computer illiterate hardware-wise and occasionally software-wise.

I just got this thing yesterday but as I was installing the Japanese Language Kit (for kicks), it suddenly blue-screened on me. Imagine having a brand new computer and it instantly BSODs in your face. It's not a pretty picture, especially when you're not a computer expert.

Anyway, I've attached the minidump but I'm afraid to touch anything else lest I break something ugh. And I'm not exactly going to tell my parents I broke my computer on the first day.

I've tried installing it again after rebooting from the BSOD and it just did the same thing.

Any help please? :C
 

Attachments

  • MINIDUMP.zip
    55.8 KB · Views: 202
Caused by Eset Smart Security, uninstall it and for now install MSE as the replacement:

Link Removed due to 404 Error


Remove Daemon Tools and its driver:

DuplexSecure - FAQ


Update or uninstall Tablet Driver:

TClass2k.sys Mon Apr 23 03:28:54 2007
UCTblHid.sys Mon Sep 08 02:10:23 2008
HID Tablet Filter Driver For Win2000/XP


Update Ralink Wireless:

Ralink 802.11g Wireless
RT2500.sys Thu Oct 20 03:00:03 2005

Update PenTablet Driver:

PTSimHid.sys Mon Apr 23 03:28:54 2007
PenTablet Hid MiniDriver for Win2000/XP/Vista




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122410-80465-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x8280b000 PsLoadedModuleList = 0x8294a570
Debug session time: Fri Dec 24 03:02:46.490 2010 (UTC - 5:00)
System Uptime: 0 days 7:35:33.957
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {33007e18, 2, 0, 9002f031}

Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
Probably caused by : eamonm.sys ( eamonm+7031 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 33007e18, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 9002f031, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 8296a700
Unable to read MiSystemVaType memory at 8294a0c0
 33007e18 

CURRENT_IRQL:  2

FAULTING_IP: 
eamonm+7031
9002f031 83791800        cmp     dword ptr [ecx+18h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  TrustedInstall

TRAP_FRAME:  af7cb73c -- (.trap 0xffffffffaf7cb73c)
ErrCode = 00000000
eax=00000000 ebx=85bfcbb0 ecx=33007e00 edx=0000003e esi=90086f54 edi=000010dc
eip=9002f031 esp=af7cb7b0 ebp=af7cb824 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
eamonm+0x7031:
9002f031 83791800        cmp     dword ptr [ecx+18h],0 ds:0023:33007e18=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 9002f031 to 82843b7b

STACK_TEXT:  
af7cb73c 9002f031 badb0d00 0000003e af7cb758 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
af7cb824 888dbaeb d5d0bbd8 af7cb844 af7cb870 eamonm+0x7031
af7cb890 888de9f0 af7cb8d4 d5a3e008 00000000 fltmgr!FltpPerformPreCallbacks+0x34d
af7cb8a8 888f21fe af7cb8d4 888f5f3c 00000000 fltmgr!FltpPassThroughInternal+0x40
af7cb8bc 888f28b7 af7cb8d4 d5a3e008 85db6520 fltmgr!FltpCreateInternal+0x24
af7cb900 82839f44 855d3020 855d9ae0 85db657c fltmgr!FltpCreate+0x2c9
af7cb918 82a0d7ad 8d6a9bc0 af7cbac0 00000000 nt!IofCallDriver+0x63
af7cb9f0 82a10988 85545bb0 856c83c0 8562cd20 nt!IopParseDevice+0xed7
af7cba6c 82a4f354 00000000 af7cbac0 00000240 nt!ObpLookupObjectName+0x4fa
af7cbacc 82a0ad4e af7cbc30 846c83c0 af7cbb00 nt!ObOpenObjectByName+0x165
af7cbb48 82a52060 af7cbbf8 00100002 af7cbc30 nt!IopCreateFile+0x673
af7cbba4 82a7c250 af7cbbf8 00100002 af7cbc30 nt!IoCreateFileEx+0x9e
af7cbc70 82a42b53 af7cbce4 d5995b08 d5be1678 nt!IopOpenLinkOrRenameTarget+0x12f
af7cbd18 8284079a 00006398 01c6f328 08039170 nt!NtSetInformationFile+0x967
af7cbd18 77c164f4 00006398 01c6f328 08039170 nt!KiFastCallEntry+0x12a
01c6f2d8 00000000 00000000 00000000 00000000 0x77c164f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
eamonm+7031
9002f031 83791800        cmp     dword ptr [ecx+18h],0

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  eamonm+7031

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: eamonm

IMAGE_NAME:  eamonm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c18e21e

FAILURE_BUCKET_ID:  0xD1_eamonm+7031

BUCKET_ID:  0xD1_eamonm+7031

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\122410-50435-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x8281d000 PsLoadedModuleList = 0x8295c570
Debug session time: Fri Dec 24 03:38:18.740 2010 (UTC - 5:00)
System Uptime: 0 days 0:34:35.833
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1018, 2, 0, 8f014031}

Unable to load image \SystemRoot\system32\DRIVERS\eamonm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for eamonm.sys
*** ERROR: Module load completed but symbols could not be loaded for eamonm.sys
Probably caused by : eamonm.sys ( eamonm+7031 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00001018, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8f014031, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 8297c700
Unable to read MiSystemVaType memory at 8295c0c0
 00001018 

CURRENT_IRQL:  2

FAULTING_IP: 
eamonm+7031
8f014031 83791800        cmp     dword ptr [ecx+18h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  TrustedInstall

TRAP_FRAME:  b0e6073c -- (.trap 0xffffffffb0e6073c)
ErrCode = 00000000
eax=00000000 ebx=8520c478 ecx=00001000 edx=0000001e esi=8f06bf54 edi=000015a4
eip=8f014031 esp=b0e607b0 ebp=b0e60824 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
eamonm+0x7031:
8f014031 83791800        cmp     dword ptr [ecx+18h],0 ds:0023:00001018=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 8f014031 to 82855b7b

STACK_TEXT:  
b0e6073c 8f014031 badb0d00 0000001e b0e60758 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
b0e60824 888e1aeb b3761a18 b0e60844 b0e60870 eamonm+0x7031
b0e60890 888e49f0 b0e608d4 8554aa58 00000000 fltmgr!FltpPerformPreCallbacks+0x34d
b0e608a8 888f81fe b0e608d4 888fbf3c 00000000 fltmgr!FltpPassThroughInternal+0x40
b0e608bc 888f88b7 b0e608d4 8554aa58 84de46e8 fltmgr!FltpCreateInternal+0x24
b0e60900 8284bf44 8560a350 85613630 84de4744 fltmgr!FltpCreate+0x2c9
b0e60918 82a1f7ad 9540f66b b0e60ac0 00000000 nt!IofCallDriver+0x63
b0e609f0 82a22988 85571e20 856d73c0 84a2f5a8 nt!IopParseDevice+0xed7
b0e60a6c 82a61354 00000000 b0e60ac0 00000240 nt!ObpLookupObjectName+0x4fa
b0e60acc 82a1cd4e b0e60c30 846d73c0 b0e60b00 nt!ObOpenObjectByName+0x165
b0e60b48 82a64060 b0e60bf8 00100002 b0e60c30 nt!IopCreateFile+0x673
b0e60ba4 82a8e250 b0e60bf8 00100002 b0e60c30 nt!IoCreateFileEx+0x9e
b0e60c70 82a54b53 b0e60ce4 d24a6730 86dcd158 nt!IopOpenLinkOrRenameTarget+0x12f
b0e60d18 8285279a 00006388 00eff444 07e46680 nt!NtSetInformationFile+0x967
b0e60d18 778e64f4 00006388 00eff444 07e46680 nt!KiFastCallEntry+0x12a
00eff3f4 00000000 00000000 00000000 00000000 0x778e64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
eamonm+7031
8f014031 83791800        cmp     dword ptr [ecx+18h],0

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  eamonm+7031

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: eamonm

IMAGE_NAME:  eamonm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c18e21e

FAILURE_BUCKET_ID:  0xD1_eamonm+7031

BUCKET_ID:  0xD1_eamonm+7031

Followup: MachineOwner
---------




Drivers:

Code:
start    end        module name
8872d000 88775000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
952ec000 95325000   ae0tlmxx ae0tlmxx.SYS Tue Jul 14 17:12:41 2009 (4A5CF4C9)
88f8e000 88fe8000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
9533d000 9534f000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
888d6000 888df000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
888aa000 888b3000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
888b3000 888d6000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
96fa0000 96fed000   ATMFD    ATMFD.DLL    Tue Oct 19 22:58:41 2010 (4CBE5AE1)
88edb000 88ee2000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
93da1000 93daf000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88497000 8849f000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
8f1ed000 8f206000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
96f80000 96f9e000   cdd      cdd.dll      unavailable (00000000)
88eb5000 88ed4000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
884e1000 8858c000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88e5e000 88e83000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
8849f000 884e1000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88a91000 88aee000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
95325000 95332000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
94817000 94824000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
93d25000 93d89000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
93d89000 93da1000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
93d19000 93d25000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88e4d000 88e5e000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
93eea000 93f03000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
93f0e000 93f17000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
93f03000 93f0e000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
93f17000 93f28000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
93f28000 93f32000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
95141000 951f8000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
951f8000 95231000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
8f00d000 8f0b3000   eamonm   eamonm.sys   Wed Jun 16 10:39:26 2010 (4C18E21E)
88ee2000 88f01000   ehdrv    ehdrv.sys    Mon Apr 19 02:46:55 2010 (4BCBFC5F)
8f0cd000 8f0ef000   epfw     epfw.sys     Mon Apr 19 02:42:22 2010 (4BCBFB4E)
95332000 9533d000   Epfwndis Epfwndis.sys Mon Apr 19 02:42:20 2010 (4BCBFB4C)
8f2a9000 8f2b7000   epfwwfp  epfwwfp.sys  Mon Apr 19 02:42:22 2010 (4BCBFB4E)
88913000 88924000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
888df000 88913000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
88afc000 88b05000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
88e1b000 88e4d000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
88d55000 88d86000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
952e6000 952eb280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
82c1d000 82c54000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
9528b000 952aa000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
93e6b000 93ebb000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
93f61000 93f74000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
93f74000 93f7a480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
93f56000 93f61000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
8f168000 8f1ed000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
88e13000 88e1b000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
94824000 95141000   igdkmd32 igdkmd32.sys Wed Aug 25 15:31:24 2010 (4C756F8C)
93dd0000 93de2000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
953e4000 953f1000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
93f7b000 93f87000   kbdhid   kbdhid.sys   Mon Jul 13 19:45:09 2009 (4A5BC705)
80bb8000 80bc0000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
93de2000 93e16000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
88a7e000 88a91000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88800000 88825000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
8f0ef000 8f0ff000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
93fbe000 93fd9000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8840e000 88486000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
93f32000 93f3d000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
953f1000 953fe000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
93f87000 93f92000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88894000 888aa000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8f206000 8f218000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
8f218000 8f23b000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
8f23b000 8f276000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
8f276000 8f291000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
88f53000 88f5e000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
88775000 8877d000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88a53000 88a7e000   msrpc    msrpc.sys    unavailable (00000000)
93d0f000 93d19000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88e03000 88e13000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88b05000 88bbc000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
95367000 95372000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8f145000 8f155000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
95372000 95394000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
93e5a000 93e6b000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
93c93000 93ca1000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
93c3b000 93c6d000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
88bbc000 88bfa000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
88f5e000 88f6c000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
93d05000 93d0f000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
8281d000 82c1d000   nt       ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B)
88924000 88a53000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
88ed4000 88edb000   Null     Null.SYS     unavailable (00000000)
8f0ff000 8f145000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
93c74000 93c93000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
887b2000 887c3000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
88788000 887b2000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8887f000 88886000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
88886000 88894000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
88aee000 88afc000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8f2b7000 8f34e000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
93ebb000 93eea000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
88486000 88497000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
94800000 94809000   PTSimBus PTSimBus.sys Thu Jun 07 05:16:26 2007 (4667CCEA)
93fb6000 93fbe000   PTSimHid PTSimHid.sys Mon Apr 23 03:28:54 2007 (462C6036)
9534f000 95367000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
95394000 953ac000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
953ac000 953c3000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
953c3000 953da000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
93cc4000 93d05000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
953da000 953e4000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
88f3b000 88f43000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
88f43000 88f4b000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
88f4b000 88f53000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88dd6000 88e03000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
8f155000 8f168000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
952aa000 952e5680   RT2500   RT2500.sys   Thu Oct 20 03:00:03 2005 (43574073)
88707000 8872d000   SCSIPORT SCSIPORT.SYS Mon Jul 13 19:45:55 2009 (4A5BC733)
8f34e000 8f358000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
88dce000 88dd6000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
8860b000 886fe000   sptd     sptd.sys     Sun Oct 11 16:54:02 2009 (4AD245EA)
ad406000 ad457000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
8f386000 8f3d5000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
8f358000 8f379000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
953fe000 953ff380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
93fad000 93fb6000   TClass2k TClass2k.sys Mon Apr 23 03:28:54 2007 (462C6036)
88c0c000 88d55000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
8f379000 8f386000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
88f83000 88f8e000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
88f6c000 88f83000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
93cb4000 93cc4000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
96f50000 96f59000   TSDDD    TSDDD.dll    Mon Jul 13 20:01:40 2009 (4A5BCAE4)
93daf000 93dd0000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
93fa9000 93faca00   UCTblHid UCTblHid.sys Mon Sep 08 02:10:23 2008 (48C4C1CF)
94809000 94817000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
93f3d000 93f54000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
93f54000 93f55700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
95231000 95240000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
93e16000 93e5a000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
95240000 9528b000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
93f92000 93fa9000   USBSTOR  USBSTOR.SYS  Mon Jul 13 19:51:19 2009 (4A5BC877)
8877d000 88788000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88f01000 88f0d000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
88f0d000 88f2e000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88d86000 88d8f000   vmstorfl vmstorfl.sys unavailable (00000000)
887c3000 887d3000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88834000 8887f000   volmgrx  volmgrx.sys  unavailable (00000000)
88d8f000 88dce000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
93ca1000 93cb4000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
88f2e000 88f3b000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8858c000 885fd000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
885fd000 8860b000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
93c6d000 93c74000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
96cf0000 96f3b000   win32k   win32k.sys   Tue Oct 19 23:00:01 2010 (4CBE5B31)
886fe000 88707000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8f0b3000 8f0cd000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
ad4c1000 ad52b000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
ad457000 ad4c1000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
8f291000 8f2a9000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
88e83000 88e90000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
88e90000 88e9b000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
88e9b000 88ea4000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
88ea4000 88eb5000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
Thank you very much for the response!

I decided not to push through with the installation. Though, how exactly do I update RaLink and the Tablet driver? I'm a little lost where to look. I don't want to take any chances in ruining another program.
 
Back
Top