Windows 7 Keep getting Blue Screen of Death!

spiritcraft

New Member
Joined
Feb 14, 2011
I am getting these very often. I have attempted a virus scan and a Windows memory diagnostic, but to no avail. It's a DRIVER_IRQL_NOT_LESS_OR_EQUAL error.

I have attached the relevant information, although my SPD tab in CPU-Z is completely greyed out and blank.

Thanks.
 

Attachments

  • BSOGFiles.zip
    50.9 KB · Views: 269
  • CPU-Z Pic 1.jpg
    CPU-Z Pic 1.jpg
    44.3 KB · Views: 683
Both crash dumps cite Atheros Wireless driver as the causer:


BugCheck D1
Probably caused by : athr.sys


Update drivers:

Atheros Wireless
athr.sys Tue Jun 09 14:04:52 2009

ArcSoft Magic-i Visual Effect
ArcSoftKsUFilter.sys Thu Mar 27 03:13:42 2008

Sony Windows 2000 DMI Call
DMICall.sys Tue Dec 05 02:14:23 2000

FsUsbExDisk.SYS
FsUsbExDisk.SYS Thu Sep 11 02:42:10 2008

Conexant
HSX_DPV.sys Fri Dec 22 14:50:21 2006

Intel Matrix Storage
iaStor.sys Tue Apr 15 20:07:31 2008

InterVideo
regi.sys Mon Apr 16 11:19:05 2007

Ricoh Memorystick Controller
rimsptsk.sys Tue Sep 02 02:29:49 2008

RTKVHDA.sys Tue Dec 16 20:52:41 2008
Realtek Audio

Sony Firmware Extension Parser driver for VAIO Series
SFEP.sys Fri Aug 03 01:36:08 2007

Touchpad
SynTP.sys Fri Jan 26 15:31:58 2007

Marvell Yukon Ethernet Controller
yk62x86.sys Mon Feb 23 09:44:18 2009





If crashes are persistant, uninstall Comodo and replace it with MSE:

Link Removed due to 404 Error

Comodo will work without crashes if you update all the old drivers above.




Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021411-24086-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83037000 PsLoadedModuleList = 0x8317f810
Debug session time: Mon Feb 14 08:42:11.897 2011 (UTC - 5:00)
System Uptime: 0 days 1:20:27.723
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {30, 2, 0, 91a568a5}

Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+428a5 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000030, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 91a568a5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 8319f718
Unable to read MiSystemVaType memory at 8317f160
 00000030 

CURRENT_IRQL:  2

FAULTING_IP: 
athr+428a5
91a568a5 8b5130          mov     edx,dword ptr [ecx+30h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  SYSTEM

TRAP_FRAME:  807e1894 -- (.trap 0xffffffff807e1894)
ErrCode = 00000000
eax=0000001a ebx=87946290 ecx=00000000 edx=00000088 esi=00000000 edi=00000001
eip=91a568a5 esp=807e1908 ebp=807e190c iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
athr+0x428a5:
91a568a5 8b5130          mov     edx,dword ptr [ecx+30h] ds:0023:00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 91a568a5 to 8307d81b

STACK_TEXT:  
807e1894 91a568a5 badb0d00 00000088 8793f6c0 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e190c 91a56647 00000000 897c5f34 8a0ada00 athr+0x428a5
807e1944 91a55c52 860cf108 876d9528 00000000 athr+0x42647
807e196c 91a7cfc0 860cf028 876d9528 00000018 athr+0x41c52
807e19c0 91a7d8c7 87185020 876d9528 00000000 athr+0x68fc0
807e1b14 91a2ecfe 876d9528 807e1b30 91a2bd2f athr+0x698c7
807e1b20 91a2bd2f 876d9528 87444668 807e1b40 athr+0x1acfe
807e1b30 91a739c7 87444668 876d9528 807e1b68 athr+0x17d2f
807e1b40 91a736b7 87676420 876d9528 00000000 athr+0x5f9c7
807e1b68 91a2762a 87676420 876d9528 00000000 athr+0x5f6b7
807e1b94 91a27414 8767ca50 876d94a0 87946290 athr+0x1362a
807e1bac 91a28499 8767ca50 8a485248 8a5c9788 athr+0x13414
807e1bc4 91a28525 8767ca50 807e1bdc 91a85554 athr+0x14499
807e1bd0 91a85554 8767ca50 807e1bf8 91a8a1ff athr+0x14525
807e1bdc 91a8a1ff 87441020 87940022 807c6a54 athr+0x71554
807e1bf8 91a2eabd 87441020 807e1c14 91a15761 athr+0x761ff
807e1c04 91a15761 87185020 8767ca50 807e1c50 athr+0x1aabd
807e1c14 8b19d309 8767ca50 00000000 807e1c40 athr+0x1761
807e1c50 8b1489f4 879462a4 00946290 00000000 ndis!ndisMiniportDpc+0xe2
807e1c78 8309f4f5 879462a4 87946290 00000000 ndis!ndisInterruptDpc+0xaf
807e1cd4 8309f358 807c5120 807ca800 00000000 nt!KiExecuteAllDpcs+0xf9
807e1d20 8309f178 00000000 0000000e ffffffff nt!KiRetireDpcList+0xd5
807e1d24 00000000 0000000e ffffffff b7ffdffd nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athr+428a5
91a568a5 8b5130          mov     edx,dword ptr [ecx+30h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  athr+428a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athr

IMAGE_NAME:  athr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a2ea444

FAILURE_BUCKET_ID:  0xD1_athr+428a5

BUCKET_ID:  0xD1_athr+428a5

Followup: MachineOwner
---------





Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\021411-21403-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83016000 PsLoadedModuleList = 0x8315e810
Debug session time: Mon Feb 14 15:53:31.552 2011 (UTC - 5:00)
System Uptime: 0 days 2:04:43.690
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {30, 2, 0, 933298a5}

Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+428a5 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000030, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 933298a5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 8317e718
Unable to read MiSystemVaType memory at 8315e160
 00000030 

CURRENT_IRQL:  2

FAULTING_IP: 
athr+428a5
933298a5 8b5130          mov     edx,dword ptr [ecx+30h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  SYSTEM

TRAP_FRAME:  807e1894 -- (.trap 0xffffffff807e1894)
ErrCode = 00000000
eax=0000001a ebx=87969e08 ecx=00000000 edx=00000088 esi=00000000 edi=00000001
eip=933298a5 esp=807e1908 ebp=807e190c iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
athr+0x428a5:
933298a5 8b5130          mov     edx,dword ptr [ecx+30h] ds:0023:00000030=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 933298a5 to 8305c81b

STACK_TEXT:  
807e1894 933298a5 badb0d00 00000088 8770c070 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e190c 93329647 00000000 883c295c c422f230 athr+0x428a5
807e1944 93328c52 cf083108 876e6528 00000000 athr+0x42647
807e196c 9334ffc0 cf083028 876e6528 00000018 athr+0x41c52
807e19c0 933508c7 856c8020 876e6528 00000000 athr+0x68fc0
807e1b14 93301cfe 876e6528 807e1b30 932fed2f athr+0x698c7
807e1b20 932fed2f 876e6528 8769ed60 807e1b40 athr+0x1acfe
807e1b30 933469c7 8769ed60 876e6528 807e1b68 athr+0x17d2f
807e1b40 933466b7 876a7628 876e6528 00000000 athr+0x5f9c7
807e1b68 932fa62a 876a7628 876e6528 00000000 athr+0x5f6b7
807e1b94 932fa414 8768ca50 876e64a0 00000000 athr+0x1362a
807e1bac 932fb499 8768ca50 85de7f60 885e9708 athr+0x13414
807e1bc4 932fb525 8768ca50 807e1bdc 93358554 athr+0x14499
807e1bd0 93358554 8768ca50 807e1bf8 9335d1ff athr+0x14525
807e1bdc 9335d1ff 8754a020 87960022 807c6a54 athr+0x71554
807e1bf8 93301abd 8754a020 807e1c14 932e8761 athr+0x761ff
807e1c04 932e8761 856c8020 8768ca50 807e1c50 athr+0x1aabd
807e1c14 8b194309 8768ca50 00000000 807e1c40 athr+0x1761
807e1c50 8b13f9f4 87969e1c 00969e08 00000000 ndis!ndisMiniportDpc+0xe2
807e1c78 8307e4f5 87969e1c 87969e08 00000000 ndis!ndisInterruptDpc+0xaf
807e1cd4 8307e358 807c5120 807ca800 00000000 nt!KiExecuteAllDpcs+0xf9
807e1d20 8307e178 00000000 0000000e ffdfffff nt!KiRetireDpcList+0xd5
807e1d24 00000000 0000000e ffdfffff fdf6ffff nt!KiIdleLoop+0x38


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athr+428a5
933298a5 8b5130          mov     edx,dword ptr [ecx+30h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  athr+428a5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athr

IMAGE_NAME:  athr.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a2ea444

FAILURE_BUCKET_ID:  0xD1_athr+428a5

BUCKET_ID:  0xD1_athr+428a5

Followup: MachineOwner
---------




Drivers:

Code:
96e3b000 96e67000   1394ohci 1394ohci.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8aea7000 8aeef000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
90a3c000 90a96000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
96f1d000 96f2f000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8b0e6000 8b0ef000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
983ee000 983f7000   ArcSoftKsUFilter ArcSoftKsUFilter.sys Thu Mar 27 03:13:42 2008 (47EB4926)
af891000 af89a000   asyncmac asyncmac.sys Mon Jul 13 19:54:46 2009 (4A5BC946)
932e7000 933f7000   athr     athr.sys     Tue Jun 09 14:04:52 2009 (4A2EA444)
8afa9000 8afb4000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
8b7dd000 8b7e4000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
90bbf000 90bcd000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
836b3000 836bb000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9850b000 98524000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
824e0000 824fe000   cdd      cdd.dll      unavailable (00000000)
8b77a000 8b799000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
836fd000 837a8000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8b661000 8b686000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
836bb000 836fd000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
96f0c000 96f0f700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
8b772000 8b77a000   cmderd   cmderd.sys   Fri Sep 10 18:03:01 2010 (4C8AAB15)
8b799000 8b7d6000   cmdguard cmdguard.sys Fri Sep 10 18:03:08 2010 (4C8AAB1C)
8b00e000 8b018000   cmdhlp   cmdhlp.sys   Fri Sep 10 18:02:21 2010 (4C8AAAED)
8b37b000 8b3d8000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
8afa1000 8afa9000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
96f10000 96f1d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
97152000 9715f000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
90ba7000 90bbf000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
90b9b000 90ba7000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8b650000 8b661000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
90b9a000 90b9ade0   DMICall  DMICall.sys  Tue Dec 05 02:14:23 2000 (3A2C95CF)
98271000 9828a000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
9715f000 97170000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8b686000 8b754000   dump_iaStor dump_iaStor.sys Tue Apr 15 20:07:31 2008 (48054343)
98012000 9801c000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
91f37000 91fee000   dxgkrnl  dxgkrnl.sys  Mon Nov 01 22:37:53 2010 (4CCF7981)
90a00000 90a39000   dxgmms1  dxgmms1.sys  Wed Feb 02 22:34:49 2011 (4D4A2259)
8b123000 8b134000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8b0ef000 8b123000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
8b3e6000 8b3ef000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
9b9bf000 9b9c7f00   FsUsbExDisk FsUsbExDisk.SYS Thu Sep 11 02:42:10 2008 (48C8BDC2)
8b61e000 8b650000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
8b577000 8b5a8000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
96ef4000 96ef9280   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:16:53 2009 (4A1151B5)
83426000 8345d000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
93278000 93297000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
97134000 97147000   HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865)
9800b000 98011480   HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863)
98000000 9800b000   hidusb   hidusb.sys   Mon Jul 13 19:51:04 2009 (4A5BC868)
9705c000 97110000   HSX_CNXT HSX_CNXT.sys Fri Dec 22 14:48:52 2006 (458C36A4)
982c7000 983ca000   HSX_DPV  HSX_DPV.sys  Fri Dec 22 14:50:21 2006 (458C36FD)
9828a000 982c7000   HSXHWAZL HSXHWAZL.sys Fri Dec 22 14:49:02 2006 (458C36AE)
98486000 9850b000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
8b3ef000 8b3f7000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
96e92000 96eaa000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8b018000 8b0e6000   iaStor   iaStor.sys   Tue Apr 15 20:07:31 2008 (48054343)
9161a000 91f37000   igdkmd32 igdkmd32.sys Wed Aug 25 15:31:24 2010 (4C756F8C)
90aee000 90b03000   inspect  inspect.sys  Fri Sep 10 18:02:55 2010 (4C8AAB0F)
96efa000 96f0c000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
96eaa000 96eb7000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80b9c000 80ba4000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
96fbc000 96ff0000   ks       ks.sys       Wed Mar 03 22:57:52 2010 (4B8F2FC0)
8b368000 8b37b000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8afca000 8afef000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
971b0000 971c0000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
9717b000 97196000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8362a000 836a2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
985c7000 985ca180   mdmxsdk  mdmxsdk.sys  Mon Jun 19 17:26:59 2006 (449716A3)
983ca000 983d7000   modem    modem.sys    Mon Jul 13 19:55:24 2009 (4A5BC96C)
97170000 9717b000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
96ee4000 96ef1000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
97147000 97152000   mouhid   mouhid.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
8afb4000 8afca000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
98524000 98536000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
98536000 98559000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
98559000 98594000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
98594000 985af000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
8b200000 8b20b000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
8aef8000 8af00000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
8b33d000 8b368000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
90b90000 90b9a000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8b5ef000 8b5ff000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
8b13e000 8b1f5000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
96f47000 96f52000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
98463000 98473000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
96f52000 96f74000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
9704b000 9705c000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
90b14000 90b22000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
90a96000 90ac8000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
837a8000 837e6000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8b000000 8b00e000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
90b86000 90b90000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
83016000 83426000   nt       ntkrpamp.exe Tue Oct 26 22:30:44 2010 (4CC78ED4)
8b20e000 8b33d000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
8b7d6000 8b7dd000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
9841d000 98463000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
90acf000 90aee000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8af35000 8af46000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
8af00000 8af2a000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
8b3d8000 8b3e6000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
9b83f000 9b8d6000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
98242000 98271000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
836a2000 836b3000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8b134000 8b13d4c0   PxHelp20 PxHelp20.sys Tue Oct 20 13:57:50 2009 (4ADDFA1E)
96f2f000 96f47000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
96f74000 96f8c000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
96f8c000 96fa3000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
96fa3000 96fba000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
90b45000 90b86000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8b600000 8b608000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8b608000 8b610000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8b610000 8b618000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
8b400000 8b42d000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
9b8d6000 9b8d7500   regi     regi.sys     Mon Apr 16 11:19:05 2007 (462393E9)
96e78000 96e92000   rimsptsk rimsptsk.sys Tue Sep 02 02:29:49 2008 (48BCDD5D)
96e67000 96e78000   risdptsk risdptsk.sys Tue Sep 02 03:15:57 2008 (48BCE82D)
98473000 98486000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
9801c000 98241300   RTKVHDA  RTKVHDA.sys  Tue Dec 16 20:52:41 2008 (49485B69)
9b8d8000 9b8e2000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
96ef1000 96ef3480   SFEP     SFEP.sys     Fri Aug 03 01:36:08 2007 (46B2BEC8)
8b5e7000 8b5ef000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
9b96e000 9b9bf000   srv      srv.sys      Thu Aug 26 23:31:26 2010 (4C77318E)
9b91f000 9b96e000   srv2     srv2.sys     Thu Aug 26 23:30:45 2010 (4C773165)
9b8e2000 9b903000   srvnet   srvnet.sys   Thu Aug 26 23:30:39 2010 (4C77315F)
9b903000 9b90a000   SSPORT   SSPORT.sys   Tue Nov 21 23:41:42 2006 (4563D506)
96fba000 96fbb380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
96eb7000 96ee1a00   SynTP    SynTP.sys    Fri Jan 26 15:31:58 2007 (45BA653E)
8b42e000 8b577000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
9b90a000 9b917000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8b1f5000 8b200000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
837e6000 837fd000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
90b35000 90b45000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
824b0000 824b9000   TSDDD    TSDDD.dll    unavailable (00000000)
90bcd000 90bee000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
96ff0000 96ffe000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
983d7000 983ee000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
96ee2000 96ee3700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
93269000 93278000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
97007000 9704b000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
9321e000 93269000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
91fee000 91ff9000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
97110000 97133b80   usbvideo usbvideo.sys Wed Mar 03 23:04:40 2010 (4B8F3158)
8af2a000 8af35000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8b7e4000 8b7f0000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8ae00000 8ae21000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
8af46000 8af56000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8af56000 8afa1000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
8b5a8000 8b5e7000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
93200000 9320a000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
90b03000 90b14000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
90b22000 90b35000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8b7f0000 8b7fd000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8ae28000 8ae99000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8ae99000 8aea7000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
90ac8000 90acf000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
82250000 8249b000   win32k   win32k.sys   unavailable (00000000)
8aeef000 8aef8000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
97196000 971b0000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
9b9c8000 9b9e8480   WUDFRd   WUDFRd.sys   Mon Jul 13 19:50:44 2009 (4A5BC854)
9b917000 9b91f000   xaudio   xaudio.sys   Tue Nov 28 19:44:50 2006 (456CD802)
93297000 932e7000   yk62x86  yk62x86.sys  Mon Feb 23 09:44:18 2009 (49A2B642)

Unloaded modules:
af827000 af891000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
985af000 985c7000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
8b686000 8b693000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
8b693000 8b761000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  000CE000
8b761000 8b772000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 
The driver update for Atheros that I have downloaded just contains a load of random files (including a .sys) and no .exe or readme. How do I install these to update the driver?

Thanks for your help

Extract the driver to a folder. Then in windows device manager, click your Atheros device >> Update driver >> Browse to the folder with the driver.

Make sure you have downloaded the right driver, otherwise it won't install.
 
Back
Top Bottom