Svchost.exe Errors

G

Guest

On bootup I am receiving the following svchost.exe error msg:
The instruction at "0x7c918fea" referenced at "0x00000010". The memory could
not be written. Click on OK to terminated application, Cancel to debug.

I've read posts on the net that Windows Update can cause this, so followed
the course which worked for others--disabled Windows Updat, reboot, perform a
manual update, then turn Auto Update back on. Didn't work.

Here is what Dr. Watson says:
Application exception occurred:
App: C:\WINDOWS\system32\svchost.exe (pid=2016)
When: 4/27/2007 @ 22:48:26.015
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: DESKTOP1
User Name: SYSTEM
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 2 Stepping 7
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization: n/a
Registered Owner: Scott McIntosh

*----> Task List <----*
0 System Process
4 System
812 smss.exe
1100 csrss.exe
1152 winlogon.exe
1220 services.exe
1232 lsass.exe
1432 svchost.exe
1508 svchost.exe
2016 svchost.exe
348 svchost.exe
664 svchost.exe
1272 spoolsv.exe
1824 userinit.exe
1864 Explorer.EXE
360 InkSaver.exe
560 vsnpstd.exe
672 CPF.exe
704 avp.exe
712 GoogleToolbarNotifier.exe
784 WALLPA~1.EXE
804 WMPNSCFG.exe
872 SUPERAntiSpyware.exe
1052 Desktop Calendar.exe
1656 drwtsn32.exe

*----> Module List <----*
(0000000000660000 - 0000000000670000: c:\windows\system32\wudfsvc.dll
(0000000000670000 - 000000000069c000: c:\windows\system32\WUDFPlatform.dll
(0000000001000000 - 0000000001006000: C:\WINDOWS\system32\svchost.exe
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b0a0000 - 000000005b0a7000: C:\WINDOWS\system32\umdmxfrm.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005cd70000 - 000000005cd77000: C:\WINDOWS\system32\serwvdrv.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(0000000063180000 - 00000000631f7000: C:\WINDOWS\system32\SHLWAPI.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: c:\windows\system32\SETUPAPI.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0x7e4 <----*

eax=77e77f78 ebx=00000000 ecx=0009afd0 edx=00000000 esi=00000000 edi=00000070
eip=7c90eb94 esp=0007fc48 ebp=0007fcb0 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Module load completed but symbols could not be loaded for
C:\WINDOWS\system32\svchost.exe
ChildEBP RetAddr Args to Child
0007fcb0 77deb3cb 00000070 0007fd7c 00000216 ntdll!KiFastSystemCallRet
0007fcdc 77deb25f 00000070 0007fd7c 00000216 ADVAPI32!SetServiceStatus+0x238
0007fd50 77deb568 00000070 0007fd7c 00000216 ADVAPI32!SetServiceStatus+0xcc
0007ffb0 01002585 00097380 0007fbc8 00000000
ADVAPI32!StartServiceCtrlDispatcherW+0x8b
0007fff0 00000000 01002509 00000000 78746341 svchost+0x2585

*----> Raw Stack Dump <----*
000000000007fc48 88 e2 90 7c 75 18 80 7c - 70 00 00 00 00 00 00 00
....|u..|p.......
000000000007fc58 00 00 00 00 00 00 00 00 - 88 fc 07 00 7c fd 07 00
.............|...
000000000007fc68 16 02 00 00 00 00 00 00 - 00 00 00 00 18 fd 07 00
.................
000000000007fc78 0e 18 80 7c 7c fd 07 00 - 00 00 00 00 16 0e 81 7c
....||..........|
000000000007fc88 b8 51 09 00 f0 ab 09 00 - 7c fd 07 00 35 d0 00 00
..Q......|...5...
000000000007fc98 74 fc 07 00 00 00 00 00 - 40 fd 07 00 a8 9a 83 7c
t.......@......|
000000000007fca8 a8 9b 80 7c ff ff ff ff - dc fc 07 00 cb b3 de 77
....|...........w
000000000007fcb8 70 00 00 00 7c fd 07 00 - 16 02 00 00 d8 fc 07 00
p...|...........
000000000007fcc8 00 00 00 00 b8 51 09 00 - f0 ab 09 00 7c fd 07 00
......Q......|...
000000000007fcd8 00 00 00 00 50 fd 07 00 - 5f b2 de 77 70 00 00 00
.....P..._..wp...
000000000007fce8 7c fd 07 00 16 02 00 00 - 18 fd 07 00 80 73 09 00
|............s..
000000000007fcf8 00 00 00 00 00 e0 fd 7f - 01 00 00 00 00 00 00 00
.................
000000000007fd08 01 00 00 00 79 b4 de 77 - b8 51 09 00 70 00 65 00
.....y..w.Q..p.e.
000000000007fd18 00 00 00 00 f0 ab 09 00 - 0c 01 00 00 00 00 00 00
.................
000000000007fd28 00 00 00 00 90 fd 07 00 - 6f 00 6c 00 00 00 00 00
.........o.l.....
000000000007fd38 f4 fc 07 00 34 00 00 00 - a0 ff 07 00 55 56 df 77
.....4.......UV.w
000000000007fd48 90 b3 de 77 ff ff ff ff - b0 ff 07 00 68 b5 de 77
....w........h..w
000000000007fd58 70 00 00 00 7c fd 07 00 - 16 02 00 00 80 73 09 00
p...|........s..
000000000007fd68 58 a0 09 00 00 e0 fd 7f - 00 00 00 00 00 00 00 00
X...............
000000000007fd78 70 00 00 00 28 00 00 00 - 50 00 00 00 00 00 00 00
p...(...P.......

*----> State Dump for Thread Id 0x10c <----*

eax=00000000 ebx=00000000 ecx=00000110 edx=0066d7a0 esi=0066d790 edi=00000000
eip=7c918fea esp=0065febc ebp=0065ff30 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!RtlpWaitForCriticalSection
7c918fce 57 push edi
7c918fcf 1bc0 sbb eax,eax
7c918fd1 f7d0 not eax
7c918fd3 2540c1977c and eax,0x7c97c140
7c918fd8 8bf8 mov edi,eax
7c918fda 8b4610 mov eax,[esi+0x10]
7c918fdd 3bc3 cmp eax,ebx
7c918fdf 8945fc mov [ebp-0x4],eax
7c918fe2 0f849e000000 je ntdll!RtlpUnWaitCriticalSection+0x2f
(7c919086)
7c918fe8 8b06 mov eax,[esi]
FAULT ->7c918fea ff4010 inc dword ptr [eax+0x10]
ds:0023:00000010=????????
7c918fed 8b45fc mov eax,[ebp-0x4]
7c918ff0 83e001 and eax,0x1
7c918ff3 8945e8 mov [ebp-0x18],eax
7c918ff6 8b06 mov eax,[esi]
7c918ff8 ff4014 inc dword ptr [eax+0x14]
7c918ffb f605f002fe7f01 test byte ptr [7ffe02f0],0x1
7c919002 0f85e6920200 jne ntdll!RtlInitializeSListHead+0x92de
(7c9422ee)
7c919008 395de8 cmp [ebp-0x18],ebx
7c91900b 57 push edi
7c91900c 53 push ebx

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
c:\windows\system32\wudfsvc.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0065ff30 7c90104b 0066d790 00665026 0066d790
ntdll!RtlpWaitForCriticalSection+0x5b
0065ff4c 006654c1 00000001 00000000 00000000
ntdll!RtlEnterCriticalSection+0x46
0065ff6c 010011cc 00000001 00000000 00000000 wudfsvc+0x54c1
0065ffa0 77deb48b 00000001 000951c0 0007e898 svchost+0x11cc
0065ffb4 7c80b683 000951b8 00000000 0007e898
ADVAPI32!CryptVerifySignatureW+0x29
0065ffec 00000000 77deb479 000951b8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000065febc 1f 00 00 00 90 d7 66 00 - 9c 13 66 00 00 00 00 00
.......f...f.....
000000000065fecc b0 c0 09 00 90 c0 09 00 - 90 d7 66 00 00 c0 fd 7f
...........f.....
000000000065fedc cc fe 65 00 c4 fe 65 00 - 28 ff 65 00 18 ee 90 7c
...e...e.(.e....|
000000000065feec 78 19 91 7c ff ff ff ff - 70 19 91 7c f1 18 91 7c
x..|....p..|...|
000000000065fefc ef 7d 5e 48 80 0a d8 11 - ad 15 50 50 54 50 30 30
..}^H......PPTP00
000000000065ff0c 62 bc 00 00 98 fe 65 00 - 98 c0 09 00 dc ff 65 00
b.....e.......e.
000000000065ff1c 55 56 df 77 00 85 df 77 - ff ff ff ff 00 00 00 00
UV.w...w........
000000000065ff2c 10 01 00 00 4c ff 65 00 - 4b 10 90 7c 90 d7 66 00
.....L.e.K..|..f.
000000000065ff3c 26 50 66 00 90 d7 66 00 - 1f 00 00 00 00 00 00 00
&Pf...f.........
000000000065ff4c 6c ff 65 00 c1 54 66 00 - 01 00 00 00 00 00 00 00
l.e..Tf.........
000000000065ff5c 00 00 00 00 c4 51 09 00 - 10 a1 09 00 00 00 00 00
......Q..........
000000000065ff6c a0 ff 65 00 cc 11 00 01 - 01 00 00 00 00 00 00 00
...e.............
000000000065ff7c 00 00 00 00 b8 51 09 00 - b8 51 09 00 00 00 00 00
......Q...Q......
000000000065ff8c 00 00 00 00 00 00 00 00 - 00 00 00 00 9c 3e 66 00
..............>f.
000000000065ff9c 86 3e 66 00 b4 ff 65 00 - 8b b4 de 77 01 00 00 00
..>f...e....w....
000000000065ffac c0 51 09 00 98 e8 07 00 - ec ff 65 00 83 b6 80 7c
..Q........e....|
000000000065ffbc b8 51 09 00 00 00 00 00 - 98 e8 07 00 b8 51 09 00
..Q...........Q..
000000000065ffcc 00 c0 fd 7f 05 00 00 c0 - c0 ff 65 00 e0 fa 65 00
...........e...e.
000000000065ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00
........|...|....
000000000065ffec 00 00 00 00 00 00 00 00 - 79 b4 de 77 b8 51 09 00
.........y..w.Q..

*----> State Dump for Thread Id 0x14c <----*

eax=00000000 ebx=007efed0 ecx=007eff7c edx=00000000 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=007efea8 ebp=007eff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
ChildEBP RetAddr Args to Child
007eff44 77df9b26 00000002 007eff6c 00000000 ntdll!KiFastSystemCallRet
007effb4 7c80b683 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
007effec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000007efea8 ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe 7e 00
....|...|......~.
00000000007efeb8 01 00 00 00 01 00 00 00 - 04 ff 7e 00 e0 2e 6b 00
...........~...k.
00000000007efec8 40 65 e4 77 00 10 00 00 - b8 00 00 00 c4 00 00 00
@e.w............
00000000007efed8 c0 fe 7e 00 00 00 cf 00 - dc ff 7e 00 a8 9a 83 7c
...~.......~....|
00000000007efee8 b0 0a 81 7c ff ff ff ff - 14 00 00 00 01 00 00 00
....|............
00000000007efef8 00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d
.............../M
00000000007eff08 ff ff ff ff 00 10 00 00 - 00 e0 fd 7f 00 b0 fd 7f
.................
00000000007eff18 00 10 00 00 04 ff 7e 00 - d0 fe 7e 00 2c 66 e4 77
.......~...~.,f.w
00000000007eff28 02 00 00 00 c4 fe 7e 00 - 20 00 00 00 dc ff 7e 00
.......~. .....~.
00000000007eff38 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b4 ff 7e 00
....|...|......~.
00000000007eff48 26 9b df 77 02 00 00 00 - 6c ff 7e 00 00 00 00 00
&..w....l.~.....
00000000007eff58 e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00
..........@.|....
00000000007eff68 00 00 00 00 b8 00 00 00 - c4 00 00 00 00 10 00 00
.................
00000000007eff78 e0 2e 6b 00 00 00 00 00 - 00 10 00 00 e8 3e 6b 00
...k..........>k.
00000000007eff88 a0 66 e4 77 58 00 00 00 - 80 66 e4 77 00 10 00 00
..f.wX....f.w....
00000000007eff98 00 00 00 00 00 00 00 00 - e0 2e 6b 00 80 66 e4 77
...........k..f.w
00000000007effa8 e5 03 00 00 00 10 00 00 - e8 3e 6b 00 ec ff 7e 00
..........>k...~.
00000000007effb8 83 b6 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00
....|.....@.|....
00000000007effc8 00 00 00 00 00 b0 fd 7f - 00 96 73 8a c0 ff 7e 00
...........s...~.
00000000007effd8 e0 55 09 89 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c
..U.........|...|

*----> State Dump for Thread Id 0x150 <----*

eax=0009e1c0 ebx=00000000 ecx=7ffda000 edx=0009e1c0 esi=0000014c edi=00000000
eip=7c90eb94 esp=0082fec0 ebp=0082ff24 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be
wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
c:\windows\system32\WUDFPlatform.dll -
ChildEBP RetAddr Args to Child
0082ff24 7c802532 0000014c 00000000 00000000 ntdll!KiFastSystemCallRet
0082ff38 0067b387 0000014c 00000000 00000000 kernel32!WaitForSingleObject+0x12
0082ff50 00685708 0009e0a0 00000000 0082ff88 WUDFPlatform!DllMain+0x2a33
0082ff60 00682838 0009e0a0 00000000 0009d938 WUDFPlatform+0x15708
0082ff88 00682862 0009e4f8 0067f5c6 0009e528 WUDFPlatform+0x12838
0082ff9c 0067bcef 0009e4f8 8a885d04 00000000 WUDFPlatform+0x12862
0082ffb4 7c80b683 0009e528 8a885d04 00000000 WUDFPlatform!DllMain+0x339b
0082ffec 00000000 0067bcbb 0009e528 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000082fec0 c0 e9 90 7c cb 25 80 7c - 4c 01 00 00 00 00 00 00
....|.%.|L.......
000000000082fed0 f4 fe 82 00 00 00 00 00 - a0 e0 09 00 00 00 00 00
.................
000000000082fee0 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
.................
000000000082fef0 10 00 00 00 00 00 00 00 - 00 00 00 00 00 e0 fd 7f
.................
000000000082ff00 00 a0 fd 7f f4 fe 82 00 - 02 01 00 00 d4 fe 82 00
.................
000000000082ff10 d8 fe 82 00 dc ff 82 00 - a8 9a 83 7c f8 25 80 7c
............|.%.|
000000000082ff20 00 00 00 00 38 ff 82 00 - 32 25 80 7c 4c 01 00 00
.....8...2%.|L...
000000000082ff30 00 00 00 00 00 00 00 00 - 50 ff 82 00 87 b3 67 00
.........P.....g.
000000000082ff40 4c 01 00 00 00 00 00 00 - 00 00 00 00 48 d9 09 00
L...........H...
000000000082ff50 60 ff 82 00 08 57 68 00 - a0 e0 09 00 00 00 00 00
`....Wh.........
000000000082ff60 88 ff 82 00 38 28 68 00 - a0 e0 09 00 00 00 00 00
.....8(h.........
000000000082ff70 38 d9 09 00 f8 e4 09 00 - 28 e5 09 00 72 00 61 00
8.......(...r.a.
000000000082ff80 00 00 00 00 00 00 00 00 - 9c ff 82 00 62 28 68 00
.............b(h.
000000000082ff90 f8 e4 09 00 c6 f5 67 00 - 28 e5 09 00 b4 ff 82 00
.......g.(.......
000000000082ffa0 ef bc 67 00 f8 e4 09 00 - 04 5d 88 8a 00 00 00 00
...g......]......
000000000082ffb0 28 e5 09 00 ec ff 82 00 - 83 b6 80 7c 28 e5 09 00
(..........|(...
000000000082ffc0 04 5d 88 8a 00 00 00 00 - 28 e5 09 00 00 a0 fd 7f
..]......(.......
000000000082ffd0 00 96 73 8a c0 ff 82 00 - 70 25 19 89 ff ff ff ff
...s.....p%......
000000000082ffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00
....|...|........
000000000082fff0 00 00 00 00 bb bc 67 00 - 28 e5 09 00 00 00 00 00
.......g.(.......

How can I rid my computer of this persistent error?
Scott
 
P

PA Bear

See http://www.bleepingcomputer.com/blogs/mowgreen/index.php?showentry=1071

Workaround: Change the default from Microsoft Update to Windows Update: Go
to Microsoft Update > Click on Change Settings in left pane > Scroll to
bottom of page > To Stop Using Microsoft Update > Disable Microsoft Update
software and let me use Windows Update only (check). cf.
http://support.microsoft.com/kb/901037

With Windows Update as your default, you will need to check in at Office
Update to keep your Office applications fully patched:
http://office.microsoft.com/en-us/downloads/maincatalog.aspx
--
~Robear Dyer (PA Bear)
MS MVP-Windows (IE, OE, Security, Shell/User)
AumHa VSOP & Admin; DTS-L.org

On bootup I am receiving the following svchost.exe error msg:
The instruction at "0x7c918fea" referenced at "0x00000010". The memory
could
not be written. Click on OK to terminated application, Cancel to debug.

I've read posts on the net that Windows Update can cause this, so followed
the course which worked for others--disabled Windows Updat, reboot,
perform
a manual update, then turn Auto Update back on. Didn't work.
<snip>
 
G

Guest

Thnx for the links but I still have the same problem after applying the
kb916089 hotfix. Also I use basic Windows Update, not Microsoft Update.
Scott
 
G

Guest

Sorry, I erred in stating I just applied kb916089. The hotfix I applied was
KB927891 and that did not fix the problem.
 
P

PA Bear

That leads me to believe that Windows Update/Automatic Update is not the
source of the problem.

Run a /thorough/ check for hijackware, including posting your hijackthis log
to an appropriate forum.

Checking for/Help with Hijackware
http://aumha.org/a/parasite.htm
http://aumha.org/a/quickfix.htm
http://aumha.net/viewtopic.php?t=5878
http://wiki.castlecops.com/Malware_Removal_and_Prevention:_Introduction
http://mvps.org/winhelp2002/unwanted.htm
http://inetexplorer.mvps.org/data/prevention.htm
http://inetexplorer.mvps.org/tshoot.html
http://www.mvps.org/sramesh2k/Malware_Defence.htm
http://defendingyourmachine2.blogspot.com/
http://www.elephantboycomputers.com/page2.html#Removing_Malware

When all else fails, HijackThis v1.99.1
(http://aumha.org/downloads/hijackthis.zip) is the preferred tool to use.
It will help you to both identify and remove any hijackware/spyware with
assistance from an expert. **Post your log to
http://forums.spybot.info/forumdisplay.php?f=22,
http://castlecops.com/forum67.html,
http://forums.subratam.org/index.php?showforum=7,
http://aumha.net/viewforum.php?f=30, or other appropriate forums for expert
analysis, not here.**

If the procedures look too complex - and there is no shame in admitting this
isn't your cup of tea - take the machine to a local, reputable and
independent (i.e., not BigBoxStoreUSA) computer repair shop.
 
G

Guest

I'm getting an error message each time I start the computer saying:
"The instruction at 0x745F2780 referenced memory at 0x00000000 could not be
writen. Click on OK to terminate application, Cancel to debug". nI am also
unable to update any windows updates. IE7 is also giving me grief. Any
solutions?
Thanks for the help.
 
G

Guest

Hi Robear,

I'm not at all daunted by that process. To be clear, in addition to
on-access virus scanning and full computer virus scans, I run 6 flavors of
anti-spyware regularly: Spybot S&D, Ad-aware, Spyware Blaster, A-squared
Free, Super Antispyware, AVG AntiSpyware, AVG Antirootkit I also use Process
Explorer, msconfig, Hijack This as needed to troubleshoot issues as I have in
this instance. There are no rogue processes on my computer.

Scott
 
P

PA Bear

No anti-spyware or anti-virus application can find and identify all
hijackware. New variants are surfacing every minute.

With all due respect, I still recommend having an expert take a look at your
HijackThis log.
 
G

Guest

With all due respect and as I indicated earlier, the suggestion that malware
was responsible was 'off the mark.' I discovered that the fix was stopping
and disabling the Windows Driver Foundation - User-mode Driver Framework
service. For anyone else to whom this suggestion may be of value: Start -
Run - Enter "Services.msc" (without the quotes) to get to the interface to
stop and disable the service.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top