1.

Solve : ntoskrnl.exe I Keep getting BSOD's i loaded the memory dump into win debugged?

Answer»

{\rtf1\ansi\ansicpg1252\deff0\deflang1033{\fonttbl{\f0\fswiss\fcharset0 Arial;}}
{\*\generator Msftedit 5.41.15.1507;}\viewkind4\uc1\pard\f0\fs20\PAR
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86\par
Copyright (c) Microsoft Corporation. All rights reserved.\par
\par
\par
Loading Dump File [C:\\Documents and Settings\\Owner\\Desktop\\Mini033008-02.dmp]\par
Mini Kernel Dump File: Only registers and stack trace are available\par
\par
Symbol search path is: *** Invalid ***\par
****************************************************************************\par
* Symbol loading may be unreliable without a symbol search path. *\par
* Use .symfix to have the debugger choose a symbol path. *\par
* After setting your symbol path, use .reload to refresh symbol locations. *\par
****************************************************************************\par
Executable search path is: \par
*********************************************************************\par
* Symbols can not be loaded because symbol path is not initialized. *\par
* *\par
* The Symbol Path can be set by: *\par
* using the _NT_SYMBOL_PATH environment variable. *\par
* using the -y argument when starting the debugger. *\par
* using .sympath and .sympath+ *\par
*********************************************************************\par
Unable to load image ntoskrnl.exe, Win32 error 0n2\par
*** WARNING: Unable to verify timestamp for ntoskrnl.exe\par
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe\par
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible\par
Product: WinNt, suite: TerminalServer SingleUserTS Personal\par
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700\par
Debug session time: SUN Mar 30 21:38:09.343 2008 (GMT+1)\par
System Uptime: 0 days 0:47:30.073\par
*********************************************************************\par
* Symbols can not be loaded because symbol path is not initialized. *\par
* *\par
* The Symbol Path can be set by: *\par
* using the _NT_SYMBOL_PATH environment variable. *\par
* using the -y argument when starting the debugger. *\par
* using .sympath and .sympath+ *\par
*********************************************************************\par
Unable to load image ntoskrnl.exe, Win32 error 0n2\par
*** WARNING: Unable to verify timestamp for ntoskrnl.exe\par
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe\par
Loading Kernel Symbols\par
...\par
Loading User Symbols\par
Loading unloaded module list\par
.................\par
*** WARNING: Unable to verify timestamp for hal.dll\par
*** ERROR: Module load completed but symbols could not be loaded for hal.dll\par
*******************************************************************************\par
* *\par
* Bugcheck Analysis *\par
* *\par
*******************************************************************************\par
\par
Use !analyze -v to get detailed debugging information.\par
\par
BugCheck 1000000A, \{80076e90, 2, 1, 806e4a16\}\par
\par
***** Kernel symbols are WRONG. Please fix symbols to do analysis.\par
\par
*************************************************************************\par
*** ***\par
*** ***\par
*** Your debugger is not using the correct symbols ***\par
*** ***\par
*** In order for this command to work properly, your symbol path ***\par
*** must point to .pdb files that have full type information. ***\par
*** ***\par
*** Certain .pdb files (such as the public OS symbols) do not ***\par
*** contain the required information. CONTACT the group that ***\par
*** provided you with these symbols if you need this command to ***\par
*** work. ***\par
*** ***\par
*** Type referenced: nt!_KPRCB ***\par
*** ***\par
*************************************************************************\par
*************************************************************************\par
*** ***\par
*** ***\par
*** Your debugger is not using the correct symbols ***\par
*** ***\par
*** In order for this command to work properly, your symbol path ***\par
*** must point to .pdb files that have full type information. ***\par
*** ***\par
*** Certain .pdb files (such as the public OS symbols) do not ***\par
*** contain the required information. Contact the group that ***\par
*** provided you with these symbols if you need this command to ***\par
*** work. ***\par
*** ***\par
*** Type referenced: nt!_KPRCB ***\par
*** ***\par
*************************************************************************\par
*********************************************************************\par
* Symbols can not be loaded because symbol path is not initialized. *\par
* *\par
* The Symbol Path can be set by: *\par
* using the _NT_SYMBOL_PATH environment variable. *\par
* using the -y argument when starting the debugger. *\par
* using .sympath and .sympath+ *\par
*********************************************************************\par
*********************************************************************\par
* Symbols can not be loaded because symbol path is not initialized. *\par
* *\par
* The Symbol Path can be set by: *\par
* using the _NT_SYMBOL_PATH environment variable. *\par
* using the -y argument when starting the debugger. *\par
* using .sympath and .sympath+ *\par
*********************************************************************\par
Probably caused by : ntoskrnl.exe ( nt+1528a9 )\par
\par
Followup: MachineOwner\par
---------\par
\par
}


I keep getting bsod's thats the memory dump ( please help.Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:17:10, on 30/03/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\XpertVision\TBPanel.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Orbitdownloader\orbitdm.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\system32\cmd.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
C:\Program Files\Debugging Tools for Windows\windbg.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Keiran
O2 - BHO: btorbit.com - {000123B4-9B42-4900-B3F7-F4B073EFC214} - C:\Program Files\Orbitdownloader\orbitcth.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [Gainward] C:\Program Files\XpertVision\TBPanel.exe /A
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe" -H
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKCU\..\Run: [Steam] "c:\program files\steam\steam.exe" -silent
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Orbit.lnk = C:\Program Files\Orbitdownloader\orbitdm.exe
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201
O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204
O8 - Extra context menu item: Do&wnload selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203
O8 - Extra context menu item: Down&load all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 6881 bytes
Thats my hijack this log.I don't think it is malware.

You can have Hijackthis fix this one entry.

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

You may want to make a post in the Windows forum describing the problem.



Discussion

No Comment Found