ntoskrnl.exe and igdkmd32.sys BSOD

#1
Hi, I've got so frequent BSOD recently and when I check the minidump, I discovered it caused by ntoskrnl.exe and igdkmd32.sys.

I'm using windows 7 professional x32.

Here my minidump file:

minidump files.zip

Anyone, please help me.

Thank you.
 


kaos

Senior Member
#2
first of all im sorry for the long reply

i didnt see your thread with no replies on

however this is your minidump information

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 82ec4a9c, 8ad8bc44, 8ad8b820}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ec4a9c, The address that the exception occurred at
Arg3: 8ad8bc44, Exception Record Address
Arg4: 8ad8b820, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]

EXCEPTION_RECORD:  8ad8bc44 -- (.exr 0xffffffff8ad8bc44)
ExceptionAddress: 82ec4a9c (nt!ExpWorkerThread+0x000000fe)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 0000000b
Attempt to read from address 0000000b

CONTEXT:  8ad8b820 -- (.cxr 0xffffffff8ad8b820)
eax=82f823e8 ebx=82f823bc ecx=0006a116 edx=00000000 esi=84e12368 edi=ffffffff
eip=82ec4a9c esp=8ad8bd0c ebp=8ad8bd50 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ExpWorkerThread+0xfe:
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch] ds:0023:0000000b=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  0000000b

READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb0848
Unable to read MiSystemVaType memory at 82f8fe20
0000000b 

FOLLOWUP_IP: 
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 8304ff64 to 82ec4a9c

STACK_TEXT:  
8ad8bd50 8304ff64 00000001 b9d8f92a 00000000 nt!ExpWorkerThread+0xfe
8ad8bd90 82ef8219 82ec499e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE

BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE

Followup: MachineOwner
---------

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8313318b, b24fc74c, 0}

*** WARNING: Unable to verify timestamp for kerneld.x32
*** ERROR: Module load completed but symbols could not be loaded for kerneld.x32
Probably caused by : kerneld.x32 ( kerneld+4d0b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8313318b, The address that the exception occurred at
Arg3: b24fc74c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExFreePoolWithTag+6d0
8313318b 8b12            mov     edx,dword ptr [edx]

TRAP_FRAME:  b24fc74c -- (.trap 0xffffffffb24fc74c)
ErrCode = 00000000
eax=0000047c ebx=20206f49 ecx=00007d90 edx=00007d90 esi=000001ff edi=85338ae0
eip=8313318b esp=b24fc7c0 ebp=b24fc818 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ExFreePoolWithTag+0x6d0:
8313318b 8b12            mov     edx,dword ptr [edx]  ds:0023:00007d90=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  aida64.exe

CURRENT_IRQL:  1

IRP_ADDRESS:  01770620

LAST_CONTROL_TRANSFER:  from 83093121 to 8313318b

STACK_TEXT:  
b24fc818 83093121 85338ae8 00000000 adc3948b nt!ExFreePoolWithTag+0x6d0
b24fc864 8308abbf 01770660 b24fc8ac b24fc8a4 nt!IopCompleteRequest+0xe6
b24fc8b4 b0f42d0b b2ff31d6 87a70250 88904c28 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b24fcbfc 83049593 88904c28 85770620 85770620 kerneld+0x4d0b
b24fcc14 8323c98f 87a70250 85770620 85770690 nt!IofCallDriver+0x63
b24fcc34 8323fb61 88904c28 87a70250 00000000 nt!IopSynchronousServiceTail+0x1f8
b24fccd0 832863fc 88904c28 85770620 00000000 nt!IopXxxControlFile+0x6aa
b24fcd04 830501ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b24fcd04 770870b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0aa6d7b4 00000000 00000000 00000000 00000000 0x770870b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
kerneld+4d0b
b0f42d0b ??              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  kerneld+4d0b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x32

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2

FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b

BUCKET_ID:  0x8E_kerneld+4d0b

Followup: MachineOwner
---------
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82f6b1f0, The address that the exception occurred at
Arg3: b48f674c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExFreePoolWithTag+735
82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx

TRAP_FRAME:  b48f674c -- (.trap 0xffffffffb48f674c)
ErrCode = 00000002
eax=ffffffff ebx=20206f49 ecx=00000007 edx=00000001 esi=000001ff edi=accf5838
eip=82f6b1f0 esp=b48f67c0 ebp=b48f6818 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ExFreePoolWithTag+0x735:
82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx ds:0023:00000007=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  aida64.exe

CURRENT_IRQL:  1

IRP_ADDRESS:  011f14f0

LAST_CONTROL_TRANSFER:  from 82ecb121 to 82f6b1f0

STACK_TEXT:  
b48f6818 82ecb121 accf5840 00000000 ab2c4b8a nt!ExFreePoolWithTag+0x735
b48f6864 82ec2bbf 011f1530 b48f68ac b48f68a4 nt!IopCompleteRequest+0xe6
b48f68b4 ae57ed0b b4213d1e 87afdf80 87afd3a8 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b48f6bfc 82e81593 87afd3a8 851f14f0 851f14f0 kerneld+0x4d0b
b48f6c14 8307498f 87afdf80 851f14f0 851f1560 nt!IofCallDriver+0x63
b48f6c34 83077b61 87afd3a8 87afdf80 00000000 nt!IopSynchronousServiceTail+0x1f8
b48f6cd0 830be3fc 87afd3a8 851f14f0 00000000 nt!IopXxxControlFile+0x6aa
b48f6d04 82e881ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b48f6d04 778670b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0abcd7b4 00000000 00000000 00000000 00000000 0x778670b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
kerneld+4d0b
ae57ed0b ??              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  kerneld+4d0b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x32

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2

FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b

BUCKET_ID:  0x8E_kerneld+4d0b

Followup: MachineOwner
---------

Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 8f0c4a1b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f7d848
Unable to read MiSystemVaType memory at 82f5ce20
ffffffff 

FAULTING_IP: 
igdkmd32+bca1b
8f0c4a1b 8910            mov     dword ptr [eax],edx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 8f05606e to 8f0c4a1b

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
8ad83bd0 8f05606e 8601a000 00070070 8ad83be8 igdkmd32+0xbca1b
8ad83bec 8f29d3e9 8601a000 00070070 8ad83c20 igdkmd32+0x4e06e
8ad83bfc 8f2bd80a 8601a000 00070070 00000000 igdkmd32+0x2953e9
8ad83c20 8f2bd43c 86e35008 c25b19cc 8ad83c40 igdkmd32+0x2b580a
8ad83c54 8f2bc89b 86e35008 8ad83c7c 856ffde8 igdkmd32+0x2b543c
8ad83cc0 8f2bd900 86e35008 00000341 00000000 igdkmd32+0x2b489b
8ad83cd8 8f03f664 8601a000 00000000 856ffde8 igdkmd32+0x2b5900
8ad83cec 83028466 85a70680 850f0e70 84e01918 igdkmd32+0x37664
8ad83d00 82e91aab 856ffde8 00000000 84e01918 nt!IopProcessWorkItem+0x23
8ad83d50 8301cf64 00000001 9559be87 00000000 nt!ExpWorkerThread+0x10d
8ad83d90 82ec5219 82e9199e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_IP: 
igdkmd32+bca1b
8f0c4a1b 8910            mov     dword ptr [eax],edx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  igdkmd32+bca1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: igdkmd32

IMAGE_NAME:  igdkmd32.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d746355

FAILURE_BUCKET_ID:  0x50_igdkmd32+bca1b

BUCKET_ID:  0x50_igdkmd32+bca1b

Followup: MachineOwner
---------


DRIVERS


Code:
start    end        module name
80bd4000 80bdc000   kdcom    kdcom.dll    Tue Jul 14 02:08:58 2009 (4A5BDAAA)
81e00000 81e13000   rspndr   rspndr.sys   Tue Jul 14 00:53:20 2009 (4A5BC8F0)
81f0f000 81f1b000   kbdhid   kbdhid.sys   Sat Nov 20 09:50:10 2010 (4CE799D2)
81f1b000 81f28000   crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
81f28000 81f33000   dump_pciidex dump_pciidex.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
81f33000 81f3d000   dump_msahci dump_msahci.sys Sat Nov 20 09:50:48 2010 (4CE799F8)
81f3d000 81f4e000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
81f59000 81f74000   luafv    luafv.sys    Tue Jul 14 00:15:44 2009 (4A5BC020)
81f74000 81fac000   aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
81fac000 81faeb00   aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
81faf000 81fc9000   WudfPf   WudfPf.sys   Sat Nov 20 09:58:55 2010 (4CE79BDF)
81fc9000 81fd7000   vmnetbridge vmnetbridge.sys Mon Aug 10 13:05:29 2009 (4A800D09)
81fd7000 81fd9f00   VMNET    VMNET.SYS    Mon Aug 10 13:03:57 2009 (4A800CAD)
81fda000 81fea000   lltdio   lltdio.sys   Tue Jul 14 00:53:18 2009 (4A5BC8EE)
81fea000 81ffa000   ndisuio  ndisuio.sys  Sat Nov 20 10:06:36 2010 (4CE79DAC)
82e14000 83226000   nt       ntkrpamp.exe Sat Apr 09 04:49:39 2011 (4D9FD753)
83226000 8325d000   hal      halmacpi.dll Sat Nov 20 08:37:38 2010 (4CE788D2)
88624000 886a9000   mcupdate mcupdate.dll Sat Nov 20 12:00:54 2010 (4CE7B876)
886a9000 886ba000   PSHED    PSHED.dll    Tue Jul 14 02:09:36 2009 (4A5BDAD0)
886ba000 886c2000   BOOTVID  BOOTVID.dll  Tue Jul 14 02:04:34 2009 (4A5BD9A2)
886c2000 88704000   CLFS     CLFS.SYS     Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88704000 887af000   CI       CI.dll       Sat Nov 20 12:05:17 2010 (4CE7B97D)
887af000 887d2000   ataport  ataport.SYS  Sat Nov 20 08:38:00 2010 (4CE788E8)
887d2000 887db000   amdxata  amdxata.sys  Fri Mar 19 16:19:01 2010 (4BA3A3F5)
88800000 88812000   winhv    winhv.sys    Sat Nov 20 08:38:15 2010 (4CE788F7)
88812000 8881b000   atapi    atapi.sys    Tue Jul 14 00:11:15 2009 (4A5BBF13)
8881b000 88825000   msahci   msahci.sys   Sat Nov 20 09:50:48 2010 (4CE799F8)
88825000 88833000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:11:15 2009 (4A5BBF13)
88833000 888a4000   Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
888a4000 888b2000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:11:25 2009 (4A5BBF1D)
888b2000 888fa000   ACPI     ACPI.sys     Sat Nov 20 08:37:52 2010 (4CE788E0)
888fa000 88903000   WMILIB   WMILIB.SYS   Tue Jul 14 00:11:22 2009 (4A5BBF1A)
88903000 8890b000   msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
8890b000 88935000   pci      pci.sys      Sat Nov 20 08:37:57 2010 (4CE788E5)
88935000 88940000   vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
88940000 88951000   partmgr  partmgr.sys  Sat Nov 20 08:38:14 2010 (4CE788F6)
88951000 88959000   compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
88959000 88964000   BATTC    BATTC.SYS    Tue Jul 14 00:19:15 2009 (4A5BC0F3)
88964000 88974000   volmgr   volmgr.sys   Sat Nov 20 08:38:06 2010 (4CE788EE)
88974000 889bf000   volmgrx  volmgrx.sys  Tue Jul 14 00:11:41 2009 (4A5BBF2D)
889bf000 889d5000   mountmgr mountmgr.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
889d5000 889fe180   vmbus    vmbus.sys    Sat Nov 20 09:14:58 2010 (4CE79192)
88a00000 88a259c0   VBoxDrv  VBoxDrv.sys  Tue Apr 26 14:10:29 2011 (4DB6C445)
88a26000 88a37000   termdd   termdd.sys   Sat Nov 20 10:21:10 2010 (4CE7A116)
88a3a000 88a6e000   fltmgr   fltmgr.sys   Tue Jul 14 00:11:13 2009 (4A5BBF11)
88a6e000 88a7f000   fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
88a7f000 88bae000   Ntfs     Ntfs.sys     Fri Mar 11 03:21:11 2011 (4D799527)
88bae000 88bd9000   msrpc    msrpc.sys    Tue Jul 14 00:11:59 2009 (4A5BBF3F)
88bd9000 88bec000   ksecdd   ksecdd.sys   Sat Nov 20 08:38:54 2010 (4CE7891E)
88bec000 88bff000   wanarp   wanarp.sys   Sat Nov 20 10:07:45 2010 (4CE79DF1)
88c00000 88c0ee80   WMDrive  WMDrive.sys  Sun Aug 22 18:14:17 2010 (4C715AE9)
88c1b000 88c78000   cng      cng.sys      Tue Jul 14 00:32:55 2009 (4A5BC427)
88c78000 88c86000   pcw      pcw.sys      Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88c86000 88c8f000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:11:14 2009 (4A5BBF12)
88c8f000 88d46000   ndis     ndis.sys     Sat Nov 20 08:39:19 2010 (4CE78937)
88d46000 88d84000   NETIO    NETIO.SYS    Sat Nov 20 08:40:03 2010 (4CE78963)
88d84000 88da9000   ksecpkg  ksecpkg.sys  Tue Jul 14 00:34:00 2009 (4A5BC468)
88dd1000 88df0000   cdrom    cdrom.sys    Sat Nov 20 08:38:09 2010 (4CE788F1)
88df0000 88dfe000   netbios  netbios.sys  Tue Jul 14 00:53:54 2009 (4A5BC912)
88e00000 88e25000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
88e26000 88f70000   tcpip    tcpip.sys    Sat Nov 20 08:41:36 2010 (4CE789C0)
88f70000 88fa1000   fwpkclnt fwpkclnt.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
88fa1000 88fb1000   mup      mup.sys      Tue Jul 14 00:14:14 2009 (4A5BBFC6)
88fb1000 88fe3000   fvevol   fvevol.sys   Sat Nov 20 08:40:22 2010 (4CE78976)
88fe3000 88ff4000   disk     disk.sys     Tue Jul 14 00:11:28 2009 (4A5BBF20)
89000000 8902d000   rdyboost rdyboost.sys Sat Nov 20 09:00:07 2010 (4CE78E17)
8902d000 89035000   hwpolicy hwpolicy.sys Sat Nov 20 08:37:35 2010 (4CE788CF)
89037000 890c8100   timntr   timntr.sys   Wed Jun 02 13:57:37 2010 (4C065541)
890c9000 890d1380   vmstorfl vmstorfl.sys Sat Nov 20 09:14:37 2010 (4CE7917D)
890d2000 89111000   volsnap  volsnap.sys  Sat Nov 20 08:38:13 2010 (4CE788F5)
89111000 891c6fa0   tdrpm273 tdrpm273.sys Tue Aug 10 10:56:21 2010 (4C612245)
891c7000 891cf000   spldr    spldr.sys    Mon May 11 17:13:47 2009 (4A084EBB)
891cf000 891f6f80   snapman  snapman.sys  Tue Aug 10 11:15:28 2010 (4C6126C0)
8e418000 8e459000   rdbss    rdbss.sys    Sat Nov 20 08:42:44 2010 (4CE78A04)
8e459000 8e463000   nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
8e463000 8e46d000   mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8e46d000 8e479000   discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8e479000 8e4dd000   csc      csc.sys      Sat Nov 20 08:44:32 2010 (4CE78A70)
8e4dd000 8e4f5000   dfsc     dfsc.sys     Sat Nov 20 08:42:32 2010 (4CE789F8)
8e4f5000 8e503000   blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
8e503000 8e54c180   aswSP    aswSP.SYS    Tue May 10 13:03:43 2011 (4DC9299F)
8e54d000 8e56e000   tunnel   tunnel.sys   Sat Nov 20 10:06:40 2010 (4CE79DB0)
8e56e000 8e58d000   HDAudBus HDAudBus.sys Sat Nov 20 09:59:28 2010 (4CE79C00)
8e58d000 8e5d3000   nwifi    nwifi.sys    Tue Jul 14 00:51:59 2009 (4A5BC89F)
8e600000 8e611000   vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
8e611000 8e619dc0   VBoxUSBMon VBoxUSBMon.sys Tue Apr 26 14:10:30 2011 (4DB6C446)
8e61e000 8e68e000   aswSnx   aswSnx.SYS   Tue May 10 13:03:53 2011 (4DC929A9)
8e68e000 8e695000   Null     Null.SYS     Tue Jul 14 00:11:12 2009 (4A5BBF10)
8e695000 8e69c000   Beep     Beep.SYS     Tue Jul 14 00:45:00 2009 (4A5BC6FC)
8e69c000 8e6a8000   vga      vga.sys      Tue Jul 14 00:25:50 2009 (4A5BC27E)
8e6a8000 8e6c9000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8e6c9000 8e6d6000   watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
8e6d6000 8e6de000   RDPCDD   RDPCDD.sys   Sat Nov 20 10:22:19 2010 (4CE7A15B)
8e6de000 8e6e6000   rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8e6e6000 8e6ee000   rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8e6ee000 8e6f9000   Msfs     Msfs.SYS     Tue Jul 14 00:11:26 2009 (4A5BBF1E)
8e6f9000 8e707000   Npfs     Npfs.SYS     Tue Jul 14 00:11:31 2009 (4A5BBF23)
8e707000 8e71e000   tdx      tdx.sys      Sat Nov 20 08:39:17 2010 (4CE78935)
8e71e000 8e72a000   TDI      TDI.SYS      Sat Nov 20 08:39:18 2010 (4CE78936)
8e72a000 8e733f00   aswTdi   aswTdi.SYS   Tue May 10 13:02:35 2011 (4DC9295B)
8e734000 8e78e000   afd      afd.sys      Sat Nov 20 08:40:00 2010 (4CE78960)
8e78e000 8e792200   aswRdr   aswRdr.SYS   Tue May 10 12:59:54 2011 (4DC928BA)
8e793000 8e7c5000   netbt    netbt.sys    Sat Nov 20 08:39:22 2010 (4CE7893A)
8e7c5000 8e7ce000   ws2ifsl  ws2ifsl.sys  Tue Jul 14 00:55:01 2009 (4A5BC955)
8e7ce000 8e7d5000   wfplwf   wfplwf.sys   Tue Jul 14 00:53:51 2009 (4A5BC90F)
8e7d5000 8e7f4000   pacer    pacer.sys    Tue Jul 14 00:53:58 2009 (4A5BC916)
8f008000 8fa99000   igdkmd32 igdkmd32.sys Mon Mar 07 04:47:17 2011 (4D746355)
8fa99000 8fb50000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 09:08:14 2010 (4CE78FFE)
8fb50000 8fb89000   dxgmms1  dxgmms1.sys  Thu Feb 03 03:45:05 2011 (4D4A24C1)
8fb89000 8fb93080   HECI     HECI.sys     Thu Sep 17 20:54:12 2009 (4AB293E4)
8fb94000 8fba3000   usbehci  usbehci.sys  Fri Mar 25 02:57:58 2011 (4D8C04B6)
8fba3000 8fbee000   USBPORT  USBPORT.SYS  Fri Mar 25 02:58:05 2011 (4D8C04BD)
90218000 904b1000   bcmwl6   bcmwl6.sys   Fri Jan 22 03:30:34 2010 (4B591BDA)
904b1000 904bb000   vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
904bb000 904cd000   L1C62x86 L1C62x86.sys Mon Sep 27 07:36:14 2010 (4CA03B5E)
904cd000 904e5000   i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
904e5000 904ff080   keyscrambler keyscrambler.sys Thu Feb 11 15:03:17 2010 (4B741C35)
90500000 9050d000   kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
9050d000 90511600   VMkbd    VMkbd.sys    Tue Sep 21 09:46:16 2010 (4C9870D8)
90512000 90548980   SynTP    SynTP.sys    Fri Nov 13 03:39:49 2009 (4AFCD505)
90549000 9054a700   USBD     USBD.SYS     Fri Mar 25 02:57:53 2011 (4D8C04B1)
9054b000 90558000   mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
90558000 90578580   Impcd    Impcd.sys    Fri Feb 26 23:31:23 2010 (4B8859CB)
90579000 9058b000   intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
9058b000 90594000   wmiacpi  wmiacpi.sys  Tue Jul 14 00:19:16 2009 (4A5BC0F4)
90594000 90597700   CmBatt   CmBatt.sys   Tue Jul 14 00:19:18 2009 (4A5BC0F6)
90598000 905dc000   usbhub   usbhub.sys   Fri Mar 25 02:58:34 2011 (4D8C04DA)
905dc000 905ffc00   usbvideo usbvideo.sys Sat Nov 20 10:00:20 2010 (4CE79C34)
90600000 90611000   NDProxy  NDProxy.SYS  Sat Nov 20 10:07:39 2010 (4CE79DEB)
90611000 90624000   HIDCLASS HIDCLASS.SYS Sat Nov 20 09:59:37 2010 (4CE79C09)
90624000 9062a480   HIDPARSE HIDPARSE.SYS Tue Jul 14 00:50:59 2009 (4A5BC863)
90633000 906fc000   cfosspeed cfosspeed.sys Tue Feb 10 11:02:05 2009 (49915EAD)
906fc000 90709000   CompositeBus CompositeBus.sys Sat Nov 20 09:50:21 2010 (4CE799DD)
90709000 9071b000   AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
9071b000 90733000   rasl2tp  rasl2tp.sys  Tue Jul 14 00:54:33 2009 (4A5BC939)
90733000 9073e000   ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
9073e000 90760000   ndiswan  ndiswan.sys  Sat Nov 20 10:07:48 2010 (4CE79DF4)
90760000 90778000   raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
90778000 9078f000   raspptp  raspptp.sys  Tue Jul 14 00:54:47 2009 (4A5BC947)
9078f000 907a6000   rassstp  rassstp.sys  Tue Jul 14 00:54:57 2009 (4A5BC951)
907a6000 907b0000   rdpbus   rdpbus.sys   Tue Jul 14 01:02:40 2009 (4A5BCB20)
907b0000 907b1380   swenum   swenum.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
907b2000 907e6000   ks       ks.sys       Sat Nov 20 09:50:17 2010 (4CE799D9)
907e6000 907f4000   umbus    umbus.sys    Sat Nov 20 10:00:23 2010 (4CE79C37)
907f4000 907ff000   mouhid   mouhid.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
90c00000 90c0b000   hidusb   hidusb.sys   Sat Nov 20 09:59:38 2010 (4CE79C0A)
90c0e000 90f4c940   RTKVHDA  RTKVHDA.sys  Thu Feb 24 10:17:00 2011 (4D66301C)
90f4d000 90f7c000   portcls  portcls.sys  Tue Jul 14 00:51:00 2009 (4A5BC864)
90f7c000 90f95000   drmk     drmk.sys     Tue Jul 14 01:36:05 2009 (4A5BD2F5)
90f95000 90fdb000   IntcDAud IntcDAud.sys Fri Oct 15 09:27:18 2010 (4CB81066)
90fdb000 90fe5000   Dxapi    Dxapi.sys    Tue Jul 14 00:25:25 2009 (4A5BC265)
90fe5000 90ffc000   usbccgp  usbccgp.sys  Fri Mar 25 02:58:06 2011 (4D8C04BE)
92010000 92019000   TSDDD    TSDDD.dll    Tue Jul 14 01:01:40 2009 (4A5BCAE4)
92040000 9205e000   cdd      cdd.dll      Sat Nov 20 11:56:35 2010 (4CE7B773)
921b0000 923fe000   win32k   win32k.sys   Thu Mar 03 03:42:10 2011 (4D6F0E12)
ad21f000 ad2a4000   HTTP     HTTP.sys     Sat Nov 20 08:40:17 2010 (4CE78971)
ad2a4000 ad2bd000   bowser   bowser.sys   Wed Feb 23 04:47:32 2011 (4D649164)
ad2bd000 ad2cf000   mpsdrv   mpsdrv.sys   Tue Jul 14 00:52:52 2009 (4A5BC8D4)
ad2cf000 ad2f2000   mrxsmb   mrxsmb.sys   Wed Feb 23 04:47:34 2011 (4D649166)
ad2f2000 ad32d000   mrxsmb10 mrxsmb10.sys Wed Feb 23 04:47:43 2011 (4D64916F)
ad32d000 ad348000   mrxsmb20 mrxsmb20.sys Wed Feb 23 04:47:39 2011 (4D64916B)
ad360000 ad36a000   hcmon    hcmon.sys    Tue Sep 21 08:55:58 2010 (4C98650E)
ad36a000 ad37ca00   SENTINEL SENTINEL.SYS Thu Sep 26 06:47:32 2002 (3D929F74)
ad37d000 ad38ca00   vmci     vmci.sys     Tue Sep 21 08:23:00 2010 (4C985D54)
ad407000 ad457000   srv2     srv2.sys     Wed Feb 23 04:47:58 2011 (4D64917E)
ad457000 ad4a9000   srv      srv.sys      Wed Feb 23 04:48:14 2011 (4D64918E)
ad4a9000 ad4cf340   afcdp    afcdp.sys    Mon Aug 30 13:11:24 2010 (4C7B9FEC)
ad4d0000 ad4d0d00   TuneUpUtilitiesDriver32 TuneUpUtilitiesDriver32.sys Thu Sep 17 12:54:55 2009 (4AB2238F)
ad4d1000 ad4dc000   AIDA64Driver AIDA64Driver.sys Fri Apr 08 23:28:02 2011 (4D9F8BF2)
ad4dc000 ad4e5000   asyncmac asyncmac.sys Tue Jul 14 00:54:46 2009 (4A5BC946)
ad4fb000 ad506000   monitor  monitor.sys  Tue Jul 14 00:25:58 2009 (4A5BC286)
ad506000 ad50f000   vwifimp  vwifimp.sys  Tue Jul 14 00:52:09 2009 (4A5BC8A9)
ad515000 ad5ec000   netr28u  netr28u.sys  Wed May 26 11:21:27 2010 (4BFCF627)
aec00000 aec04c80   vmnetuserif vmnetuserif.sys Tue Sep 21 09:09:44 2010 (4C986848)
aec05000 aec08d80   vstor2_ws60 vstor2-ws60.sys Thu Aug 19 21:28:38 2010 (4C6D93F6)
aec20000 aeceee00   vmx86    vmx86.sys    Tue Sep 21 10:33:16 2010 (4C987BDC)
aecef000 aed19000   fastfat  fastfat.SYS  Tue Jul 14 00:14:01 2009 (4A5BBFB9)
aed19000 aed31000   idmwfp   idmwfp.sys   Mon Mar 28 18:36:01 2011 (4D90C701)
aed31000 aedc8000   peauth   peauth.sys   Tue Jul 14 01:35:44 2009 (4A5BD2E0)
aedc8000 aedd2000   secdrv   secdrv.SYS   Wed Sep 13 14:18:32 2006 (45080528)
aedd2000 aedf3000   srvnet   srvnet.sys   Wed Feb 23 04:47:53 2011 (4D649179)
aedf3000 aee00000   tcpipreg tcpipreg.sys Sat Nov 20 10:07:13 2010 (4CE79DD1)

Unloaded modules:
ad50f000 ad515000   vmusb.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00006000
81e38000 81f0f000   netr28u.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  000D7000
81e13000 81e1c000   vwifimp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
ad4f0000 ad4fb000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
ad4e5000 ad4f0000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
81f4e000 81f59000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
ad38d000 ad3f7000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
ad348000 ad360000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
8e58d000 8e5bb000   RtsUStor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002E000
88da9000 88db6000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
88ff4000 88fff000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
88db6000 88dc0000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
88dc0000 88dd1000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 


kaos

Senior Member
#3
try updating your drivers, some drivers are quite old

e.g

aedc8000 aedd2000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.
Top