Donneykiller

New Member
Joined
Jan 26, 2011
Messages
30
I was playing Counter Strike 1.6 and League of Legends when i get error IRQL NOT LESS OR EQUAL! After that i got startup BSOD which is not a problem it fixes by windows....Minidumps uploaded..
 


Attachments

Last edited:
Solution
here dump. i get this after installation (not irql , i got something else)



Update NVIDIA videocard driver:

nvlddmkm.sys Tue Jul 14 15:54:48 2009

Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [F:\a\Minidump\D M P\DMP\012611-14102-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a02000...
While I'm reading your crash dumps, please give me this info:

Link Removed

Take SPD screenshots for each of the RAM slots.

...
 


Old nForce here.


Code:
PAGE_FAULT_IN_NONPAGED_AREA (50)
DEFAULT_BUCKET_ID:  CODE_CORRUPTION
PROCESS_NAME:  nvvsvc.exe
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)


Update NVIDIA display and nForce drivers:

nvmfdx32.sys Mon Jan 15 19:50:38 2007
nvstor32.sys Mon Aug 18 21:53:17 2008
nvlddmkm.sys Sun Sep 27 20:13:17 2009






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\012311-17019-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a14000 PsLoadedModuleList = 0x82b5c810
Debug session time: Sun Jan 23 05:34:48.692 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:17.378
Loading Kernel Symbols
...............................................................
.............................................................
Loading User Symbols
Loading unloaded module list
....
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffff92, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 9055447a, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82b7c718
Unable to read MiSystemVaType memory at 82b5c160
 ffffff92 

FAULTING_IP: 
dxgkrnl!DxgkCloseAdapter+1a
9055447a f65390          not     byte ptr [ebx-70h]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

PROCESS_NAME:  nvvsvc.exe

CURRENT_IRQL:  0

TRAP_FRAME:  8b403c68 -- (.trap 0xffffffff8b403c68)
ErrCode = 00000002
eax=8b403d08 ebx=00000002 ecx=86f89d48 edx=93c2ea4d esi=0012f698 edi=000007d2
eip=9055447a esp=8b403cdc ebp=8b403d18 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
dxgkrnl!DxgkCloseAdapter+0x1a:
9055447a f65390          not     byte ptr [ebx-70h]         ds:0023:ffffff92=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82a5a5f8 to 82a998e3

STACK_TEXT:  
8b403c50 82a5a5f8 00000001 ffffff92 00000000 nt!MmAccessFault+0x106
8b403c50 9055447a 00000001 ffffff92 00000000 nt!KiTrap0E+0xdc
8b403d18 93c2ea62 0012f69c 00000001 8b403d34 dxgkrnl!DxgkCloseAdapter+0x1a
8b403d28 82a5742a 0012f69c 02010384 77d964f4 win32k!NtGdiDdDDICloseAdapter+0x15
8b403d28 77d964f4 0012f69c 02010384 77d964f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
02010384 00000000 00000000 00000000 00000000 0x77d964f4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgkrnl
    90554478 - dxgkrnl!DxgkCloseAdapter+18
	[ 1d:1c ]
1 error : !dxgkrnl (90554478)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

Followup: memory_corruption
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\012211-12324-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 

"nt" was not found in the image list.
Debugger will attempt to load "nt" at given base 00000000.

Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to load image nt, Win32 error 0n2
Unable to add module at 00000000
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a04000 PsLoadedModuleList = 0x82b4c810
Debug session time: Sat Jan 22 13:11:27.410 2011 (UTC - 5:00)
System Uptime: 0 days 0:46:20.080

"nt" was not found in the image list.
Debugger will attempt to load "nt" at given base 00000000.

Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to load image nt, Win32 error 0n2
Unable to add module at 00000000
Debugger can not determine kernel base address
Loading Kernel Symbols

Loading User Symbols
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8e5483f6, Virtual address for the attempted write.
Arg2: 7be9b121, PTE contents.
Arg3: 82b2abac, (reserved)
Arg4: 0000000a, (reserved)

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xBE

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82a4a5f8 to 82a898e3

STACK_TEXT:  
WARNING: Frame IP not in any known module. Following frames may be wrong.
82b2ab94 82a4a5f8 00000001 8e5483f6 00000000 0x82a898e3
82b2abac 82e167ac badb0d00 000000d1 82a6f1ef 0x82a4a5f8
82b2ac28 8e5483f6 badb0d00 00000000 00000000 0x82e167ac
82b2ad20 82a6c00d 00000000 0000000e 00000000 0x8e5483f6
82b2ad24 00000000 0000000e 00000000 00000000 0x82a6c00d


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  CORRUPT_MODULELIST

Followup: MachineOwner
---------




Drivers:

Code:
start    end        module name
887ac000 887f4000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d884000 8d8de000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
905e9000 905fb000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8e4d0000 8e4e1000   amdppm   amdppm.sys   Mon Jul 13 19:11:03 2009 (4A5BBF07)
8898c000 88995000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
888cf000 888d8000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
888d8000 888fb000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
88dec000 88df3000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8e4a1000 8e4af000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
88638000 88640000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
93e90000 93eae000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
889da000 889f9000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
88682000 8872d000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88d80000 88da5000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88640000 88682000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88b80000 88bdd000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
905dc000 905e9000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
90b34000 90b41000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8e425000 8e489000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8e489000 8e4a1000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8d9d6000 8d9e2000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88e00000 88e11000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
90b11000 90b2a000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
90b41000 90b4b000   dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
90b70000 90b81000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
90b4b000 90b70000   dump_nvstor32 dump_nvstor32.sys Mon Aug 18 21:53:17 2008 (48AA278D)
90b2a000 90b34000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
90525000 905dc000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
8eb2a000 8eb63000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
8e4e1000 8e4ec000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
889c9000 889da000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8ea00000 8ea0a000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
88995000 889c9000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
88beb000 88bf4000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
88d4e000 88d80000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88f67000 88f98000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82e24000 82e5b000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8e5a4000 8e5c3000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
90a92000 90ae2000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
88ff8000 89000000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8e50e000 8e526000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8e533000 8e540000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80b9b000 80ba3000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8e5c3000 8e5f7000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
88b6d000 88b80000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88cfc000 88d21000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
90bc1000 90bd1000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
90b8c000 90ba7000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8861c000 88627000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
90b81000 90b8c000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
8e526000 8e533000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
888b9000 888cf000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
8d849000 8d854000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
88600000 88608000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88b42000 88b6d000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8d9cc000 8d9d6000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88fe8000 88ff8000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88c07000 88cbe000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
8fc00000 8fc0b000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8eb7b000 8eb9d000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
90a81000 90a92000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8d936000 8d944000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8d8de000 8d910000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
88cbe000 88cfc000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8d854000 8d862000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8d9c2000 8d9cc000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a14000 82e24000   nt       ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
88a13000 88b42000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
88de5000 88dec000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
90523000 90524080   nvBridge nvBridge.kmd Sun Sep 27 19:56:53 2009 (4ABFFBC5)
8fc12000 90522160   nvlddmkm nvlddmkm.sys Sun Sep 27 20:13:17 2009 (4ABFFF9D)
8ea2f000 8eb29480   nvmfdx32 nvmfdx32.sys Mon Jan 15 19:50:38 2007 (45AC215E)
888fb000 88920000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
88967000 8898c000   nvstor32 nvstor32.sys Mon Aug 18 21:53:17 2008 (48AA278D)
8d917000 8d936000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8e4f6000 8e50e000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
88838000 88849000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
88803000 8882d000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
888a4000 888ab000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
888ab000 888b9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
88bdd000 88beb000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
90ae2000 90b11000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
88627000 88638000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8eb63000 8eb7b000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
8eb9d000 8ebb5000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8ebb5000 8ebcc000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
8ebcc000 8ebe3000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8d981000 8d9c2000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8ebe3000 8ebed000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
8d831000 8d839000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
8d839000 8d841000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
8d841000 8d849000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88d21000 88d4e000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
90bd1000 90be4000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8e4ec000 8e4f6000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8d944000 8d95e000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
88fe0000 88fe8000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
88920000 88967000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
8fc0b000 8fc0c380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88e1e000 88f67000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
8d879000 8d884000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8d862000 8d879000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8d971000 8d981000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
93e60000 93e69000   TSDDD    TSDDD.dll    unavailable (00000000)
8e4af000 8e4d0000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
8ebed000 8ebfb000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
8e595000 8e5a4000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
90a3d000 90a81000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8e540000 8e54a000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
8e54a000 8e595000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
8882d000 88838000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88df3000 88dff000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
8d803000 8d824000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88f98000 88fa0380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
88849000 88859000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88859000 888a4000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
88fa1000 88fe0000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
8d95e000 8d971000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
8d824000 8d831000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8872d000 8879e000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
8879e000 887ac000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d910000 8d917000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
93c00000 93e4a000   win32k   win32k.sys   Mon Jul 13 19:26:26 2009 (4A5BC2A2)
887f4000 887fd000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
90ba7000 90bc1000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)

Unloaded modules:
88e11000 88e1e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
88da5000 88daf000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
88daf000 88dd4000   dump_nvstor3
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00025000
88dd4000 88de5000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 


Ok take a look at thease attachments while i install and download drivers

BTW i got just 1 slot filled with 2gb kingston ram
 


Attachments

  • 012611-13884-01.dmp
    012611-13884-01.dmp
    156.9 KB · Views: 255
  • 012611-13868-01.dmp
    012611-13868-01.dmp
    156.9 KB · Views: 265
  • Capture.webp
    Capture.webp
    24.2 KB · Views: 601
Last edited:
Ok BTW i got a problem with overheating CPU so i lowered voltage for 0.050 on BIOS but its 80% slower :S

here CPU capiture
 


Attachments

  • Capture.webp
    Capture.webp
    31.8 KB · Views: 571
Here is latest report after updating drivers
Do not close thread i will test now games which caused bsod and if i still have it i will post a 'post'
 


Attachments

There are no crash dumps in the archive.

nForce hasn't been updated:

Code:
NVIDIA nForce Networki Kernel        1/16/2007
 


need help i cant find that driver i used Device Doctor and downloaded a driver named nForce networking driver .... but it came out that i didnt update it please find me that update i cant find it anywhere! :S
 


here dump. i get this after installation (not irql , i got something else)



Update NVIDIA videocard driver:

nvlddmkm.sys Tue Jul 14 15:54:48 2009

Crash Dumps:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [F:\a\Minidump\D M P\DMP\012611-14102-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a02000 PsLoadedModuleList = 0x82b4a810
Debug session time: Wed Jan 26 16:37:13.897 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:16.582
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 82a8bf1d, 8fb1b9b8, 0}
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+1e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82a8bf1d, The address that the exception occurred at
Arg3: 8fb1b9b8, Trap Frame
Arg4: 00000000
Debugging Details:
------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP: 
nt!ExIsResourceAcquiredSharedLite+f
82a8bf1d 397e20          cmp     dword ptr [esi+20h],edi
TRAP_FRAME:  8fb1b9b8 -- (.trap 0xffffffff8fb1b9b8)
ErrCode = 00000000
eax=85e4cb00 ebx=88be807e ecx=94904000 edx=00000000 esi=00000000 edi=00000000
eip=82a8bf1d esp=8fb1ba2c ebp=8fb1ba40 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ExIsResourceAcquiredSharedLite+0xf:
82a8bf1d 397e20          cmp     dword ptr [esi+20h],edi ds:0023:00000020=????????
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0x8E
PROCESS_NAME:  dwm.exe
CURRENT_IRQL:  0
LAST_CONTROL_TRANSFER:  from 8e426512 to 82a8bf1d
STACK_TEXT:  
8fb1ba40 8e426512 00000000 949790d8 8e483340 nt!ExIsResourceAcquiredSharedLite+0xf
8fb1ba4c 8e483340 94904008 949790d8 00000000 dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+0x1e
8fb1ba70 8e4493b5 949790d8 949790d8 94904008 dxgkrnl!DXGDEVICE::RemovePrimaryAllocation+0x4d
8fb1bae4 8e449a8b 00000000 00000000 949790d8 dxgkrnl!DXGDEVICE::DestroyAllocations+0xa5
8fb1bb08 8e449d6e 00000000 00000000 949790d8 dxgkrnl!DXGDEVICE::TerminateAllocations+0x191
8fb1bb64 8e44a594 8fb1bb98 00000001 01f24f23 dxgkrnl!DXGDEVICE::DestroyAllocation+0x2d6
8fb1bd28 82a4542a 0312f2cc 0312f2f0 775e64f4 dxgkrnl!DxgkDestroyAllocation+0x6d1
8fb1bd28 775e64f4 0312f2cc 0312f2f0 775e64f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0312f2f0 00000000 00000000 00000000 00000000 0x775e64f4

STACK_COMMAND:  kb
FOLLOWUP_IP: 
dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+1e
8e426512 85c0            test    eax,eax
SYMBOL_STACK_INDEX:  1
SYMBOL_NAME:  dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+1e
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME:  dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc297
FAILURE_BUCKET_ID:  0x8E_dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+1e
BUCKET_ID:  0x8E_dxgkrnl!DXGADAPTER::IsCoreResourceSharedOwner+1e
Followup: MachineOwner
---------


Drivers:
Code:
start    end        module name
8879e000 887e6000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8d630000 8d68a000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
8e522000 8e534000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8ca7b000 8ca8c000   amdppm   amdppm.sys   Mon Jul 13 19:11:03 2009 (4A5BBF07)
889bc000 889c5000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
888ed000 888f6000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
888f6000 88919000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
88de3000 88dea000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8ca4c000 8ca5a000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
8862a000 88632000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
9277a000 92793000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
945c0000 945de000   cdd      cdd.dll      Mon Jul 13 21:04:18 2009 (4A5BD992)
88dbd000 88ddc000   cdrom    cdrom.sys    Mon Jul 13 19:11:24 2009 (4A5BBF1C)
88674000 8871f000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
88d98000 88dbd000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
88632000 88674000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
88b73000 88bd0000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
8e515000 8e522000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
9465e000 94667000   cpuz135_x32 cpuz135_x32.sys Tue Nov 09 08:32:57 2010 (4CD94D89)
8e418000 8e425000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8d78e000 8d7f2000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
8ca34000 8ca4c000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8d782000 8d78e000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
88d87000 88d98000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
8cbb3000 8cbcc000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
8f7f4000 8f7fe000   dump_diskdump dump_diskdump.sys Mon Jul 13 19:45:49 2009 (4A5BC72D)
9266a000 9267b000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
92633000 9266a000   dump_nvstor32 dump_nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
9267b000 92685000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
8e425000 8e4dc000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:26:15 2009 (4A5BC297)
8e4dc000 8e515000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
8ca8c000 8ca97000   fdc      fdc.sys      Mon Jul 13 19:45:45 2009 (4A5BC729)
88800000 88811000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
8e40e000 8e418000   flpydisk flpydisk.sys Mon Jul 13 19:45:45 2009 (4A5BC729)
889c5000 889f9000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
88bde000 88be7000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:11:14 2009 (4A5BBF12)
88d55000 88d87000   fvevol   fvevol.sys   Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88f7a000 88fab000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
82e12000 82e49000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8cb4f000 8cb6e000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
8f7a4000 8f7f4000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
926f5000 9277a000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
88d4d000 88d55000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8cab9000 8cad1000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8cade000 8caeb000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
80bcc000 80bd4000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8e5cb000 8e5ff000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
88b60000 88b73000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
88d18000 88d3d000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:34:00 2009 (4A5BC468)
926d2000 926e2000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
9269d000 926b8000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
8860e000 88619000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 19:13:13 2009 (4A5BBF89)
92692000 9269d000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
8cad1000 8cade000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
888d7000 888ed000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
92793000 927a5000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
927a5000 927c8000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:14:24 2009 (4A5BBFD0)
94601000 9463c000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
9463c000 94657000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
88600000 8860b000   Msfs     Msfs.SYS     Mon Jul 13 19:11:26 2009 (4A5BBF1E)
887ef000 887f7000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88b35000 88b60000   msrpc    msrpc.sys    Mon Jul 13 19:11:59 2009 (4A5BBF3F)
8d778000 8d782000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
88d3d000 88d4d000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88c23000 88cda000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
8e54c000 8e557000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8e557000 8e579000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
8f793000 8f7a4000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
8d6e2000 8d6f0000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
8d68a000 8d6bc000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
88cda000 88d18000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
8d600000 8d60e000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
8d76e000 8d778000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
82a02000 82e12000   nt       ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
88a06000 88b35000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
88ddc000 88de3000   Null     Null.SYS     Mon Jul 13 19:11:12 2009 (4A5BBF10)
8f74d000 8f74e080   nvBridge nvBridge.kmd Tue Jul 14 15:39:01 2009 (4A5CDED5)
8ee2f000 8f74c4e0   nvlddmkm nvlddmkm.sys Tue Jul 14 15:54:48 2009 (4A5CE288)
8cb6e000 8cbb2880   nvmf6232 nvmf6232.sys Thu Jul 30 19:47:55 2009 (4A72312B)
88919000 8893e000   nvstor   nvstor.sys   Wed May 20 02:44:09 2009 (4A13A6B9)
88985000 889bc000   nvstor32 nvstor32.sys Tue Aug 04 20:27:05 2009 (4A78D1D9)
8d6c3000 8d6e2000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
8caa1000 8cab9000   parport  parport.sys  Mon Jul 13 19:45:34 2009 (4A5BC71E)
88856000 88867000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
94657000 9465e000   parvdm   parvdm.sys   Mon Jul 13 19:45:29 2009 (4A5BC719)
88821000 8884b000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
888c2000 888c9000   pciide   pciide.sys   Mon Jul 13 19:11:19 2009 (4A5BBF17)
888c9000 888d7000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
88bd0000 88bde000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8ee00000 8ee2f000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
88619000 8862a000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
8e534000 8e54c000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
8e579000 8e591000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8e591000 8e5a8000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
8e5a8000 8e5bf000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
8d72d000 8d76e000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8e5bf000 8e5c9000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
88df6000 88dfe000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
88bf4000 88bfc000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
88811000 88819000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88e00000 88e2d000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
926e2000 926f5000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8ca97000 8caa1000   serenum  serenum.sys  Mon Jul 13 19:45:27 2009 (4A5BC717)
8d6f0000 8d70a000   serial   serial.sys   Mon Jul 13 19:45:33 2009 (4A5BC71D)
88ff3000 88ffb000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
8893e000 88985000   storport storport.sys Mon Jul 13 19:45:58 2009 (4A5BC736)
8e5c9000 8e5ca380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
88e31000 88f7a000   tcpip    tcpip.sys    Mon Jul 13 19:13:18 2009 (4A5BBF8E)
8d625000 8d630000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8d60e000 8d625000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8d71d000 8d72d000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
94590000 94599000   TSDDD    TSDDD.dll    unavailable (00000000)
8ca5a000 8ca7b000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
8e400000 8e40e000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
92690000 92691700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
8cb40000 8cb4f000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
8f74f000 8f793000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8caeb000 8caf5000   usbohci  usbohci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
8caf5000 8cb40000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
92685000 92690000   usbprint usbprint.sys Mon Jul 13 20:17:06 2009 (4A5BCE82)
8884b000 88856000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
88dea000 88df6000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
88c00000 88c21000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88fab000 88fb3380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
88867000 88877000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88877000 888c2000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
88fb4000 88ff3000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
8d70a000 8d71d000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
88be7000 88bf4000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
8871f000 88790000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
88790000 8879e000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8d6bc000 8d6c3000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
94330000 9457a000   win32k   win32k.sys   Mon Jul 13 19:26:26 2009 (4A5BC2A2)
887e6000 887ef000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
926b8000 926d2000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
 


Solution
Im downloading nvidia graphic driver now for my video card and if it doesnt update that file than im in deeep crap
 


Last edited:
its not graphic driver...
i did a search and found more nvlddmkm.sys files
2 of them are up to date
others not
its to something called Nvidia Kernel Driver as i remember so cuz 2nd time i couldnt find it :S
this is realy bad...
 


I updated graphic driver NVLDDMKM.SYS UPDATED!

nForce networking driver is left i will install him by WINDOWS UPDATE i saw it there so it will be downloaded automatically.

After this i think everything should be ok i will post you driver list so if u find anything more for updates let me know.
 


Attachments

Last edited:
Im going to bury my video card ! :@
I got 3 dumps , one after playing a game and 2 after startup.
I work on Safe Mode now .... HELP FAST!

here latest report from diagnostic tool.
 


Attachments

Back
Top