ntoskrnl.exe and igdkmd32.sys BSOD

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by padey88, May 18, 2011.

  1. padey88

    padey88 New Member

    Joined:
    May 18, 2011
    Messages:
    2
    Likes Received:
    0
    Hi, I've got so frequent BSOD recently and when I check the minidump, I discovered it caused by ntoskrnl.exe and igdkmd32.sys.

    I'm using windows 7 professional x32.

    Here my minidump file:

    minidump files.zip

    Anyone, please help me.

    Thank you.
     
  2. kaos

    kaos Senior Member

    Joined:
    May 9, 2011
    Messages:
    1,747
    Likes Received:
    33
    first of all im sorry for the long reply

    i didnt see your thread with no replies on

    however this is your minidump information

    Code:
    
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 82ec4a9c, 8ad8bc44, 8ad8b820}
    
    Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82ec4a9c, The address that the exception occurred at
    Arg3: 8ad8bc44, Exception Record Address
    Arg4: 8ad8b820, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExpWorkerThread+fe
    82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]
    
    EXCEPTION_RECORD:  8ad8bc44 -- (.exr 0xffffffff8ad8bc44)
    ExceptionAddress: 82ec4a9c (nt!ExpWorkerThread+0x000000fe)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 0000000b
    Attempt to read from address 0000000b
    
    CONTEXT:  8ad8b820 -- (.cxr 0xffffffff8ad8b820)
    eax=82f823e8 ebx=82f823bc ecx=0006a116 edx=00000000 esi=84e12368 edi=ffffffff
    eip=82ec4a9c esp=8ad8bd0c ebp=8ad8bd50 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!ExpWorkerThread+0xfe:
    82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch] ds:0023:0000000b=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  0000000b
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb0848
    Unable to read MiSystemVaType memory at 82f8fe20
    0000000b 
    
    FOLLOWUP_IP: 
    nt!ExpWorkerThread+fe
    82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 8304ff64 to 82ec4a9c
    
    STACK_TEXT:  
    8ad8bd50 8304ff64 00000001 b9d8f92a 00000000 nt!ExpWorkerThread+0xfe
    8ad8bd90 82ef8219 82ec499e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Unknown_Module
    
    IMAGE_NAME:  Unknown_Image
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    FAILURE_BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE
    
    BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE
    
    Followup: MachineOwner
    ---------
    
    
    

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 8313318b, b24fc74c, 0}
    
    *** WARNING: Unable to verify timestamp for kerneld.x32
    *** ERROR: Module load completed but symbols could not be loaded for kerneld.x32
    Probably caused by : kerneld.x32 ( kerneld+4d0b )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 8313318b, The address that the exception occurred at
    Arg3: b24fc74c, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExFreePoolWithTag+6d0
    8313318b 8b12            mov     edx,dword ptr [edx]
    
    TRAP_FRAME:  b24fc74c -- (.trap 0xffffffffb24fc74c)
    ErrCode = 00000000
    eax=0000047c ebx=20206f49 ecx=00007d90 edx=00007d90 esi=000001ff edi=85338ae0
    eip=8313318b esp=b24fc7c0 ebp=b24fc818 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!ExFreePoolWithTag+0x6d0:
    8313318b 8b12            mov     edx,dword ptr [edx]  ds:0023:00007d90=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  aida64.exe
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  01770620
    
    LAST_CONTROL_TRANSFER:  from 83093121 to 8313318b
    
    STACK_TEXT:  
    b24fc818 83093121 85338ae8 00000000 adc3948b nt!ExFreePoolWithTag+0x6d0
    b24fc864 8308abbf 01770660 b24fc8ac b24fc8a4 nt!IopCompleteRequest+0xe6
    b24fc8b4 b0f42d0b b2ff31d6 87a70250 88904c28 nt!IopfCompleteRequest+0x3b4
    WARNING: Stack unwind information not available. Following frames may be wrong.
    b24fcbfc 83049593 88904c28 85770620 85770620 kerneld+0x4d0b
    b24fcc14 8323c98f 87a70250 85770620 85770690 nt!IofCallDriver+0x63
    b24fcc34 8323fb61 88904c28 87a70250 00000000 nt!IopSynchronousServiceTail+0x1f8
    b24fccd0 832863fc 88904c28 85770620 00000000 nt!IopXxxControlFile+0x6aa
    b24fcd04 830501ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
    b24fcd04 770870b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
    0aa6d7b4 00000000 00000000 00000000 00000000 0x770870b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    kerneld+4d0b
    b0f42d0b ??              ???
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  kerneld+4d0b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: kerneld
    
    IMAGE_NAME:  kerneld.x32
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2
    
    FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b
    
    BUCKET_ID:  0x8E_kerneld+4d0b
    
    Followup: MachineOwner
    ---------
    
    
    
    Code:
    
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82f6b1f0, The address that the exception occurred at
    Arg3: b48f674c, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ExFreePoolWithTag+735
    82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx
    
    TRAP_FRAME:  b48f674c -- (.trap 0xffffffffb48f674c)
    ErrCode = 00000002
    eax=ffffffff ebx=20206f49 ecx=00000007 edx=00000001 esi=000001ff edi=accf5838
    eip=82f6b1f0 esp=b48f67c0 ebp=b48f6818 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!ExFreePoolWithTag+0x735:
    82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx ds:0023:00000007=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  aida64.exe
    
    CURRENT_IRQL:  1
    
    IRP_ADDRESS:  011f14f0
    
    LAST_CONTROL_TRANSFER:  from 82ecb121 to 82f6b1f0
    
    STACK_TEXT:  
    b48f6818 82ecb121 accf5840 00000000 ab2c4b8a nt!ExFreePoolWithTag+0x735
    b48f6864 82ec2bbf 011f1530 b48f68ac b48f68a4 nt!IopCompleteRequest+0xe6
    b48f68b4 ae57ed0b b4213d1e 87afdf80 87afd3a8 nt!IopfCompleteRequest+0x3b4
    WARNING: Stack unwind information not available. Following frames may be wrong.
    b48f6bfc 82e81593 87afd3a8 851f14f0 851f14f0 kerneld+0x4d0b
    b48f6c14 8307498f 87afdf80 851f14f0 851f1560 nt!IofCallDriver+0x63
    b48f6c34 83077b61 87afd3a8 87afdf80 00000000 nt!IopSynchronousServiceTail+0x1f8
    b48f6cd0 830be3fc 87afd3a8 851f14f0 00000000 nt!IopXxxControlFile+0x6aa
    b48f6d04 82e881ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
    b48f6d04 778670b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
    0abcd7b4 00000000 00000000 00000000 00000000 0x778670b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    kerneld+4d0b
    ae57ed0b ??              ???
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  kerneld+4d0b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: kerneld
    
    IMAGE_NAME:  kerneld.x32
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2
    
    FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b
    
    BUCKET_ID:  0x8E_kerneld+4d0b
    
    Followup: MachineOwner
    ---------
    
    
    

    Code:
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: ffffffff, memory referenced.
    Arg2: 00000001, value 0 = read operation, 1 = write operation.
    Arg3: 8f0c4a1b, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 00000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f7d848
    Unable to read MiSystemVaType memory at 82f5ce20
    ffffffff 
    
    FAULTING_IP: 
    igdkmd32+bca1b
    8f0c4a1b 8910            mov     dword ptr [eax],edx
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 8f05606e to 8f0c4a1b
    
    STACK_TEXT:  
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8ad83bd0 8f05606e 8601a000 00070070 8ad83be8 igdkmd32+0xbca1b
    8ad83bec 8f29d3e9 8601a000 00070070 8ad83c20 igdkmd32+0x4e06e
    8ad83bfc 8f2bd80a 8601a000 00070070 00000000 igdkmd32+0x2953e9
    8ad83c20 8f2bd43c 86e35008 c25b19cc 8ad83c40 igdkmd32+0x2b580a
    8ad83c54 8f2bc89b 86e35008 8ad83c7c 856ffde8 igdkmd32+0x2b543c
    8ad83cc0 8f2bd900 86e35008 00000341 00000000 igdkmd32+0x2b489b
    8ad83cd8 8f03f664 8601a000 00000000 856ffde8 igdkmd32+0x2b5900
    8ad83cec 83028466 85a70680 850f0e70 84e01918 igdkmd32+0x37664
    8ad83d00 82e91aab 856ffde8 00000000 84e01918 nt!IopProcessWorkItem+0x23
    8ad83d50 8301cf64 00000001 9559be87 00000000 nt!ExpWorkerThread+0x10d
    8ad83d90 82ec5219 82e9199e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    igdkmd32+bca1b
    8f0c4a1b 8910            mov     dword ptr [eax],edx
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  igdkmd32+bca1b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: igdkmd32
    
    IMAGE_NAME:  igdkmd32.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d746355
    
    FAILURE_BUCKET_ID:  0x50_igdkmd32+bca1b
    
    BUCKET_ID:  0x50_igdkmd32+bca1b
    
    Followup: MachineOwner
    ---------
    


    DRIVERS


    Code:
    start    end        module name
    80bd4000 80bdc000   kdcom    kdcom.dll    Tue Jul 14 02:08:58 2009 (4A5BDAAA)
    81e00000 81e13000   rspndr   rspndr.sys   Tue Jul 14 00:53:20 2009 (4A5BC8F0)
    81f0f000 81f1b000   kbdhid   kbdhid.sys   Sat Nov 20 09:50:10 2010 (4CE799D2)
    81f1b000 81f28000   crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
    81f28000 81f33000   dump_pciidex dump_pciidex.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
    81f33000 81f3d000   dump_msahci dump_msahci.sys Sat Nov 20 09:50:48 2010 (4CE799F8)
    81f3d000 81f4e000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
    81f59000 81f74000   luafv    luafv.sys    Tue Jul 14 00:15:44 2009 (4A5BC020)
    81f74000 81fac000   aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
    81fac000 81faeb00   aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
    81faf000 81fc9000   WudfPf   WudfPf.sys   Sat Nov 20 09:58:55 2010 (4CE79BDF)
    81fc9000 81fd7000   vmnetbridge vmnetbridge.sys Mon Aug 10 13:05:29 2009 (4A800D09)
    81fd7000 81fd9f00   VMNET    VMNET.SYS    Mon Aug 10 13:03:57 2009 (4A800CAD)
    81fda000 81fea000   lltdio   lltdio.sys   Tue Jul 14 00:53:18 2009 (4A5BC8EE)
    81fea000 81ffa000   ndisuio  ndisuio.sys  Sat Nov 20 10:06:36 2010 (4CE79DAC)
    82e14000 83226000   nt       ntkrpamp.exe Sat Apr 09 04:49:39 2011 (4D9FD753)
    83226000 8325d000   hal      halmacpi.dll Sat Nov 20 08:37:38 2010 (4CE788D2)
    88624000 886a9000   mcupdate mcupdate.dll Sat Nov 20 12:00:54 2010 (4CE7B876)
    886a9000 886ba000   PSHED    PSHED.dll    Tue Jul 14 02:09:36 2009 (4A5BDAD0)
    886ba000 886c2000   BOOTVID  BOOTVID.dll  Tue Jul 14 02:04:34 2009 (4A5BD9A2)
    886c2000 88704000   CLFS     CLFS.SYS     Tue Jul 14 00:11:10 2009 (4A5BBF0E)
    88704000 887af000   CI       CI.dll       Sat Nov 20 12:05:17 2010 (4CE7B97D)
    887af000 887d2000   ataport  ataport.SYS  Sat Nov 20 08:38:00 2010 (4CE788E8)
    887d2000 887db000   amdxata  amdxata.sys  Fri Mar 19 16:19:01 2010 (4BA3A3F5)
    88800000 88812000   winhv    winhv.sys    Sat Nov 20 08:38:15 2010 (4CE788F7)
    88812000 8881b000   atapi    atapi.sys    Tue Jul 14 00:11:15 2009 (4A5BBF13)
    8881b000 88825000   msahci   msahci.sys   Sat Nov 20 09:50:48 2010 (4CE799F8)
    88825000 88833000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:11:15 2009 (4A5BBF13)
    88833000 888a4000   Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
    888a4000 888b2000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:11:25 2009 (4A5BBF1D)
    888b2000 888fa000   ACPI     ACPI.sys     Sat Nov 20 08:37:52 2010 (4CE788E0)
    888fa000 88903000   WMILIB   WMILIB.SYS   Tue Jul 14 00:11:22 2009 (4A5BBF1A)
    88903000 8890b000   msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
    8890b000 88935000   pci      pci.sys      Sat Nov 20 08:37:57 2010 (4CE788E5)
    88935000 88940000   vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
    88940000 88951000   partmgr  partmgr.sys  Sat Nov 20 08:38:14 2010 (4CE788F6)
    88951000 88959000   compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
    88959000 88964000   BATTC    BATTC.SYS    Tue Jul 14 00:19:15 2009 (4A5BC0F3)
    88964000 88974000   volmgr   volmgr.sys   Sat Nov 20 08:38:06 2010 (4CE788EE)
    88974000 889bf000   volmgrx  volmgrx.sys  Tue Jul 14 00:11:41 2009 (4A5BBF2D)
    889bf000 889d5000   mountmgr mountmgr.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
    889d5000 889fe180   vmbus    vmbus.sys    Sat Nov 20 09:14:58 2010 (4CE79192)
    88a00000 88a259c0   VBoxDrv  VBoxDrv.sys  Tue Apr 26 14:10:29 2011 (4DB6C445)
    88a26000 88a37000   termdd   termdd.sys   Sat Nov 20 10:21:10 2010 (4CE7A116)
    88a3a000 88a6e000   fltmgr   fltmgr.sys   Tue Jul 14 00:11:13 2009 (4A5BBF11)
    88a6e000 88a7f000   fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
    88a7f000 88bae000   Ntfs     Ntfs.sys     Fri Mar 11 03:21:11 2011 (4D799527)
    88bae000 88bd9000   msrpc    msrpc.sys    Tue Jul 14 00:11:59 2009 (4A5BBF3F)
    88bd9000 88bec000   ksecdd   ksecdd.sys   Sat Nov 20 08:38:54 2010 (4CE7891E)
    88bec000 88bff000   wanarp   wanarp.sys   Sat Nov 20 10:07:45 2010 (4CE79DF1)
    88c00000 88c0ee80   WMDrive  WMDrive.sys  Sun Aug 22 18:14:17 2010 (4C715AE9)
    88c1b000 88c78000   cng      cng.sys      Tue Jul 14 00:32:55 2009 (4A5BC427)
    88c78000 88c86000   pcw      pcw.sys      Tue Jul 14 00:11:10 2009 (4A5BBF0E)
    88c86000 88c8f000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:11:14 2009 (4A5BBF12)
    88c8f000 88d46000   ndis     ndis.sys     Sat Nov 20 08:39:19 2010 (4CE78937)
    88d46000 88d84000   NETIO    NETIO.SYS    Sat Nov 20 08:40:03 2010 (4CE78963)
    88d84000 88da9000   ksecpkg  ksecpkg.sys  Tue Jul 14 00:34:00 2009 (4A5BC468)
    88dd1000 88df0000   cdrom    cdrom.sys    Sat Nov 20 08:38:09 2010 (4CE788F1)
    88df0000 88dfe000   netbios  netbios.sys  Tue Jul 14 00:53:54 2009 (4A5BC912)
    88e00000 88e25000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
    88e26000 88f70000   tcpip    tcpip.sys    Sat Nov 20 08:41:36 2010 (4CE789C0)
    88f70000 88fa1000   fwpkclnt fwpkclnt.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
    88fa1000 88fb1000   mup      mup.sys      Tue Jul 14 00:14:14 2009 (4A5BBFC6)
    88fb1000 88fe3000   fvevol   fvevol.sys   Sat Nov 20 08:40:22 2010 (4CE78976)
    88fe3000 88ff4000   disk     disk.sys     Tue Jul 14 00:11:28 2009 (4A5BBF20)
    89000000 8902d000   rdyboost rdyboost.sys Sat Nov 20 09:00:07 2010 (4CE78E17)
    8902d000 89035000   hwpolicy hwpolicy.sys Sat Nov 20 08:37:35 2010 (4CE788CF)
    89037000 890c8100   timntr   timntr.sys   Wed Jun 02 13:57:37 2010 (4C065541)
    890c9000 890d1380   vmstorfl vmstorfl.sys Sat Nov 20 09:14:37 2010 (4CE7917D)
    890d2000 89111000   volsnap  volsnap.sys  Sat Nov 20 08:38:13 2010 (4CE788F5)
    89111000 891c6fa0   tdrpm273 tdrpm273.sys Tue Aug 10 10:56:21 2010 (4C612245)
    891c7000 891cf000   spldr    spldr.sys    Mon May 11 17:13:47 2009 (4A084EBB)
    891cf000 891f6f80   snapman  snapman.sys  Tue Aug 10 11:15:28 2010 (4C6126C0)
    8e418000 8e459000   rdbss    rdbss.sys    Sat Nov 20 08:42:44 2010 (4CE78A04)
    8e459000 8e463000   nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
    8e463000 8e46d000   mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
    8e46d000 8e479000   discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
    8e479000 8e4dd000   csc      csc.sys      Sat Nov 20 08:44:32 2010 (4CE78A70)
    8e4dd000 8e4f5000   dfsc     dfsc.sys     Sat Nov 20 08:42:32 2010 (4CE789F8)
    8e4f5000 8e503000   blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
    8e503000 8e54c180   aswSP    aswSP.SYS    Tue May 10 13:03:43 2011 (4DC9299F)
    8e54d000 8e56e000   tunnel   tunnel.sys   Sat Nov 20 10:06:40 2010 (4CE79DB0)
    8e56e000 8e58d000   HDAudBus HDAudBus.sys Sat Nov 20 09:59:28 2010 (4CE79C00)
    8e58d000 8e5d3000   nwifi    nwifi.sys    Tue Jul 14 00:51:59 2009 (4A5BC89F)
    8e600000 8e611000   vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
    8e611000 8e619dc0   VBoxUSBMon VBoxUSBMon.sys Tue Apr 26 14:10:30 2011 (4DB6C446)
    8e61e000 8e68e000   aswSnx   aswSnx.SYS   Tue May 10 13:03:53 2011 (4DC929A9)
    8e68e000 8e695000   Null     Null.SYS     Tue Jul 14 00:11:12 2009 (4A5BBF10)
    8e695000 8e69c000   Beep     Beep.SYS     Tue Jul 14 00:45:00 2009 (4A5BC6FC)
    8e69c000 8e6a8000   vga      vga.sys      Tue Jul 14 00:25:50 2009 (4A5BC27E)
    8e6a8000 8e6c9000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
    8e6c9000 8e6d6000   watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
    8e6d6000 8e6de000   RDPCDD   RDPCDD.sys   Sat Nov 20 10:22:19 2010 (4CE7A15B)
    8e6de000 8e6e6000   rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
    8e6e6000 8e6ee000   rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
    8e6ee000 8e6f9000   Msfs     Msfs.SYS     Tue Jul 14 00:11:26 2009 (4A5BBF1E)
    8e6f9000 8e707000   Npfs     Npfs.SYS     Tue Jul 14 00:11:31 2009 (4A5BBF23)
    8e707000 8e71e000   tdx      tdx.sys      Sat Nov 20 08:39:17 2010 (4CE78935)
    8e71e000 8e72a000   TDI      TDI.SYS      Sat Nov 20 08:39:18 2010 (4CE78936)
    8e72a000 8e733f00   aswTdi   aswTdi.SYS   Tue May 10 13:02:35 2011 (4DC9295B)
    8e734000 8e78e000   afd      afd.sys      Sat Nov 20 08:40:00 2010 (4CE78960)
    8e78e000 8e792200   aswRdr   aswRdr.SYS   Tue May 10 12:59:54 2011 (4DC928BA)
    8e793000 8e7c5000   netbt    netbt.sys    Sat Nov 20 08:39:22 2010 (4CE7893A)
    8e7c5000 8e7ce000   ws2ifsl  ws2ifsl.sys  Tue Jul 14 00:55:01 2009 (4A5BC955)
    8e7ce000 8e7d5000   wfplwf   wfplwf.sys   Tue Jul 14 00:53:51 2009 (4A5BC90F)
    8e7d5000 8e7f4000   pacer    pacer.sys    Tue Jul 14 00:53:58 2009 (4A5BC916)
    8f008000 8fa99000   igdkmd32 igdkmd32.sys Mon Mar 07 04:47:17 2011 (4D746355)
    8fa99000 8fb50000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 09:08:14 2010 (4CE78FFE)
    8fb50000 8fb89000   dxgmms1  dxgmms1.sys  Thu Feb 03 03:45:05 2011 (4D4A24C1)
    8fb89000 8fb93080   HECI     HECI.sys     Thu Sep 17 20:54:12 2009 (4AB293E4)
    8fb94000 8fba3000   usbehci  usbehci.sys  Fri Mar 25 02:57:58 2011 (4D8C04B6)
    8fba3000 8fbee000   USBPORT  USBPORT.SYS  Fri Mar 25 02:58:05 2011 (4D8C04BD)
    90218000 904b1000   bcmwl6   bcmwl6.sys   Fri Jan 22 03:30:34 2010 (4B591BDA)
    904b1000 904bb000   vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
    904bb000 904cd000   L1C62x86 L1C62x86.sys Mon Sep 27 07:36:14 2010 (4CA03B5E)
    904cd000 904e5000   i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
    904e5000 904ff080   keyscrambler keyscrambler.sys Thu Feb 11 15:03:17 2010 (4B741C35)
    90500000 9050d000   kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
    9050d000 90511600   VMkbd    VMkbd.sys    Tue Sep 21 09:46:16 2010 (4C9870D8)
    90512000 90548980   SynTP    SynTP.sys    Fri Nov 13 03:39:49 2009 (4AFCD505)
    90549000 9054a700   USBD     USBD.SYS     Fri Mar 25 02:57:53 2011 (4D8C04B1)
    9054b000 90558000   mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
    90558000 90578580   Impcd    Impcd.sys    Fri Feb 26 23:31:23 2010 (4B8859CB)
    90579000 9058b000   intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
    9058b000 90594000   wmiacpi  wmiacpi.sys  Tue Jul 14 00:19:16 2009 (4A5BC0F4)
    90594000 90597700   CmBatt   CmBatt.sys   Tue Jul 14 00:19:18 2009 (4A5BC0F6)
    90598000 905dc000   usbhub   usbhub.sys   Fri Mar 25 02:58:34 2011 (4D8C04DA)
    905dc000 905ffc00   usbvideo usbvideo.sys Sat Nov 20 10:00:20 2010 (4CE79C34)
    90600000 90611000   NDProxy  NDProxy.SYS  Sat Nov 20 10:07:39 2010 (4CE79DEB)
    90611000 90624000   HIDCLASS HIDCLASS.SYS Sat Nov 20 09:59:37 2010 (4CE79C09)
    90624000 9062a480   HIDPARSE HIDPARSE.SYS Tue Jul 14 00:50:59 2009 (4A5BC863)
    90633000 906fc000   cfosspeed cfosspeed.sys Tue Feb 10 11:02:05 2009 (49915EAD)
    906fc000 90709000   CompositeBus CompositeBus.sys Sat Nov 20 09:50:21 2010 (4CE799DD)
    90709000 9071b000   AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
    9071b000 90733000   rasl2tp  rasl2tp.sys  Tue Jul 14 00:54:33 2009 (4A5BC939)
    90733000 9073e000   ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
    9073e000 90760000   ndiswan  ndiswan.sys  Sat Nov 20 10:07:48 2010 (4CE79DF4)
    90760000 90778000   raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
    90778000 9078f000   raspptp  raspptp.sys  Tue Jul 14 00:54:47 2009 (4A5BC947)
    9078f000 907a6000   rassstp  rassstp.sys  Tue Jul 14 00:54:57 2009 (4A5BC951)
    907a6000 907b0000   rdpbus   rdpbus.sys   Tue Jul 14 01:02:40 2009 (4A5BCB20)
    907b0000 907b1380   swenum   swenum.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
    907b2000 907e6000   ks       ks.sys       Sat Nov 20 09:50:17 2010 (4CE799D9)
    907e6000 907f4000   umbus    umbus.sys    Sat Nov 20 10:00:23 2010 (4CE79C37)
    907f4000 907ff000   mouhid   mouhid.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
    90c00000 90c0b000   hidusb   hidusb.sys   Sat Nov 20 09:59:38 2010 (4CE79C0A)
    90c0e000 90f4c940   RTKVHDA  RTKVHDA.sys  Thu Feb 24 10:17:00 2011 (4D66301C)
    90f4d000 90f7c000   portcls  portcls.sys  Tue Jul 14 00:51:00 2009 (4A5BC864)
    90f7c000 90f95000   drmk     drmk.sys     Tue Jul 14 01:36:05 2009 (4A5BD2F5)
    90f95000 90fdb000   IntcDAud IntcDAud.sys Fri Oct 15 09:27:18 2010 (4CB81066)
    90fdb000 90fe5000   Dxapi    Dxapi.sys    Tue Jul 14 00:25:25 2009 (4A5BC265)
    90fe5000 90ffc000   usbccgp  usbccgp.sys  Fri Mar 25 02:58:06 2011 (4D8C04BE)
    92010000 92019000   TSDDD    TSDDD.dll    Tue Jul 14 01:01:40 2009 (4A5BCAE4)
    92040000 9205e000   cdd      cdd.dll      Sat Nov 20 11:56:35 2010 (4CE7B773)
    921b0000 923fe000   win32k   win32k.sys   Thu Mar 03 03:42:10 2011 (4D6F0E12)
    ad21f000 ad2a4000   HTTP     HTTP.sys     Sat Nov 20 08:40:17 2010 (4CE78971)
    ad2a4000 ad2bd000   bowser   bowser.sys   Wed Feb 23 04:47:32 2011 (4D649164)
    ad2bd000 ad2cf000   mpsdrv   mpsdrv.sys   Tue Jul 14 00:52:52 2009 (4A5BC8D4)
    ad2cf000 ad2f2000   mrxsmb   mrxsmb.sys   Wed Feb 23 04:47:34 2011 (4D649166)
    ad2f2000 ad32d000   mrxsmb10 mrxsmb10.sys Wed Feb 23 04:47:43 2011 (4D64916F)
    ad32d000 ad348000   mrxsmb20 mrxsmb20.sys Wed Feb 23 04:47:39 2011 (4D64916B)
    ad360000 ad36a000   hcmon    hcmon.sys    Tue Sep 21 08:55:58 2010 (4C98650E)
    ad36a000 ad37ca00   SENTINEL SENTINEL.SYS Thu Sep 26 06:47:32 2002 (3D929F74)
    ad37d000 ad38ca00   vmci     vmci.sys     Tue Sep 21 08:23:00 2010 (4C985D54)
    ad407000 ad457000   srv2     srv2.sys     Wed Feb 23 04:47:58 2011 (4D64917E)
    ad457000 ad4a9000   srv      srv.sys      Wed Feb 23 04:48:14 2011 (4D64918E)
    ad4a9000 ad4cf340   afcdp    afcdp.sys    Mon Aug 30 13:11:24 2010 (4C7B9FEC)
    ad4d0000 ad4d0d00   TuneUpUtilitiesDriver32 TuneUpUtilitiesDriver32.sys Thu Sep 17 12:54:55 2009 (4AB2238F)
    ad4d1000 ad4dc000   AIDA64Driver AIDA64Driver.sys Fri Apr 08 23:28:02 2011 (4D9F8BF2)
    ad4dc000 ad4e5000   asyncmac asyncmac.sys Tue Jul 14 00:54:46 2009 (4A5BC946)
    ad4fb000 ad506000   monitor  monitor.sys  Tue Jul 14 00:25:58 2009 (4A5BC286)
    ad506000 ad50f000   vwifimp  vwifimp.sys  Tue Jul 14 00:52:09 2009 (4A5BC8A9)
    ad515000 ad5ec000   netr28u  netr28u.sys  Wed May 26 11:21:27 2010 (4BFCF627)
    aec00000 aec04c80   vmnetuserif vmnetuserif.sys Tue Sep 21 09:09:44 2010 (4C986848)
    aec05000 aec08d80   vstor2_ws60 vstor2-ws60.sys Thu Aug 19 21:28:38 2010 (4C6D93F6)
    aec20000 aeceee00   vmx86    vmx86.sys    Tue Sep 21 10:33:16 2010 (4C987BDC)
    aecef000 aed19000   fastfat  fastfat.SYS  Tue Jul 14 00:14:01 2009 (4A5BBFB9)
    aed19000 aed31000   idmwfp   idmwfp.sys   Mon Mar 28 18:36:01 2011 (4D90C701)
    aed31000 aedc8000   peauth   peauth.sys   Tue Jul 14 01:35:44 2009 (4A5BD2E0)
    aedc8000 aedd2000   secdrv   secdrv.SYS   Wed Sep 13 14:18:32 2006 (45080528)
    aedd2000 aedf3000   srvnet   srvnet.sys   Wed Feb 23 04:47:53 2011 (4D649179)
    aedf3000 aee00000   tcpipreg tcpipreg.sys Sat Nov 20 10:07:13 2010 (4CE79DD1)
    
    Unloaded modules:
    ad50f000 ad515000   vmusb.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00006000
    81e38000 81f0f000   netr28u.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  000D7000
    81e13000 81e1c000   vwifimp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    ad4f0000 ad4fb000   monitor.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    ad4e5000 ad4f0000   monitor.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    81f4e000 81f59000   monitor.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    ad38d000 ad3f7000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0006A000
    ad348000 ad360000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    8e58d000 8e5bb000   RtsUStor.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0002E000
    88da9000 88db6000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000D000
    88ff4000 88fff000   dump_pciidex
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000B000
    88db6000 88dc0000   dump_msahci.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    88dc0000 88dd1000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00011000
    
    
    
     
  3. kaos

    kaos Senior Member

    Joined:
    May 9, 2011
    Messages:
    1,747
    Likes Received:
    33
    try updating your drivers, some drivers are quite old

    e.g

    aedc8000 aedd2000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
     

Share This Page

Loading...