Windows 7 ntoskrnl.exe and igdkmd32.sys BSOD

padey88

New Member
Joined
May 18, 2011
Messages
2
Hi, I've got so frequent BSOD recently and when I check the minidump, I discovered it caused by ntoskrnl.exe and igdkmd32.sys.

I'm using windows 7 professional x32.

Here my minidump file:

Link Removed due to 404 Error

Anyone, please help me.

Thank you.
 

Solution
try updating your drivers, some drivers are quite old

e.g

aedc8000 aedd2000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
first of all im sorry for the long reply

i didnt see your thread with no replies on

however this is your minidump information

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 82ec4a9c, 8ad8bc44, 8ad8b820}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ec4a9c, The address that the exception occurred at
Arg3: 8ad8bc44, Exception Record Address
Arg4: 8ad8b820, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]

EXCEPTION_RECORD:  8ad8bc44 -- (.exr 0xffffffff8ad8bc44)
ExceptionAddress: 82ec4a9c (nt!ExpWorkerThread+0x000000fe)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 0000000b
Attempt to read from address 0000000b

CONTEXT:  8ad8b820 -- (.cxr 0xffffffff8ad8b820)
eax=82f823e8 ebx=82f823bc ecx=0006a116 edx=00000000 esi=84e12368 edi=ffffffff
eip=82ec4a9c esp=8ad8bd0c ebp=8ad8bd50 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ExpWorkerThread+0xfe:
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch] ds:0023:0000000b=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  0000000b

READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb0848
Unable to read MiSystemVaType memory at 82f8fe20
0000000b 

FOLLOWUP_IP: 
nt!ExpWorkerThread+fe
82ec4a9c 8b4f0c          mov     ecx,dword ptr [edi+0Ch]

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 8304ff64 to 82ec4a9c

STACK_TEXT:  
8ad8bd50 8304ff64 00000001 b9d8f92a 00000000 nt!ExpWorkerThread+0xfe
8ad8bd90 82ef8219 82ec499e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE

BUCKET_ID:  0x7E_ANALYSIS_INCONCLUSIVE

Followup: MachineOwner
---------


Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8313318b, b24fc74c, 0}

*** WARNING: Unable to verify timestamp for kerneld.x32
*** ERROR: Module load completed but symbols could not be loaded for kerneld.x32
Probably caused by : kerneld.x32 ( kerneld+4d0b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8313318b, The address that the exception occurred at
Arg3: b24fc74c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExFreePoolWithTag+6d0
8313318b 8b12            mov     edx,dword ptr [edx]

TRAP_FRAME:  b24fc74c -- (.trap 0xffffffffb24fc74c)
ErrCode = 00000000
eax=0000047c ebx=20206f49 ecx=00007d90 edx=00007d90 esi=000001ff edi=85338ae0
eip=8313318b esp=b24fc7c0 ebp=b24fc818 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!ExFreePoolWithTag+0x6d0:
8313318b 8b12            mov     edx,dword ptr [edx]  ds:0023:00007d90=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  aida64.exe

CURRENT_IRQL:  1

IRP_ADDRESS:  01770620

LAST_CONTROL_TRANSFER:  from 83093121 to 8313318b

STACK_TEXT:  
b24fc818 83093121 85338ae8 00000000 adc3948b nt!ExFreePoolWithTag+0x6d0
b24fc864 8308abbf 01770660 b24fc8ac b24fc8a4 nt!IopCompleteRequest+0xe6
b24fc8b4 b0f42d0b b2ff31d6 87a70250 88904c28 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b24fcbfc 83049593 88904c28 85770620 85770620 kerneld+0x4d0b
b24fcc14 8323c98f 87a70250 85770620 85770690 nt!IofCallDriver+0x63
b24fcc34 8323fb61 88904c28 87a70250 00000000 nt!IopSynchronousServiceTail+0x1f8
b24fccd0 832863fc 88904c28 85770620 00000000 nt!IopXxxControlFile+0x6aa
b24fcd04 830501ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b24fcd04 770870b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0aa6d7b4 00000000 00000000 00000000 00000000 0x770870b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
kerneld+4d0b
b0f42d0b ??              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  kerneld+4d0b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x32

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2

FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b

BUCKET_ID:  0x8E_kerneld+4d0b

Followup: MachineOwner
---------

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82f6b1f0, The address that the exception occurred at
Arg3: b48f674c, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExFreePoolWithTag+735
82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx

TRAP_FRAME:  b48f674c -- (.trap 0xffffffffb48f674c)
ErrCode = 00000002
eax=ffffffff ebx=20206f49 ecx=00000007 edx=00000001 esi=000001ff edi=accf5838
eip=82f6b1f0 esp=b48f67c0 ebp=b48f6818 iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
nt!ExFreePoolWithTag+0x735:
82f6b1f0 f00fc111        lock xadd dword ptr [ecx],edx ds:0023:00000007=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  aida64.exe

CURRENT_IRQL:  1

IRP_ADDRESS:  011f14f0

LAST_CONTROL_TRANSFER:  from 82ecb121 to 82f6b1f0

STACK_TEXT:  
b48f6818 82ecb121 accf5840 00000000 ab2c4b8a nt!ExFreePoolWithTag+0x735
b48f6864 82ec2bbf 011f1530 b48f68ac b48f68a4 nt!IopCompleteRequest+0xe6
b48f68b4 ae57ed0b b4213d1e 87afdf80 87afd3a8 nt!IopfCompleteRequest+0x3b4
WARNING: Stack unwind information not available. Following frames may be wrong.
b48f6bfc 82e81593 87afd3a8 851f14f0 851f14f0 kerneld+0x4d0b
b48f6c14 8307498f 87afdf80 851f14f0 851f1560 nt!IofCallDriver+0x63
b48f6c34 83077b61 87afd3a8 87afdf80 00000000 nt!IopSynchronousServiceTail+0x1f8
b48f6cd0 830be3fc 87afd3a8 851f14f0 00000000 nt!IopXxxControlFile+0x6aa
b48f6d04 82e881ea 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
b48f6d04 778670b4 0000021c 00000000 00000000 nt!KiFastCallEntry+0x12a
0abcd7b4 00000000 00000000 00000000 00000000 0x778670b4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
kerneld+4d0b
ae57ed0b ??              ???

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  kerneld+4d0b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: kerneld

IMAGE_NAME:  kerneld.x32

DEBUG_FLR_IMAGE_TIMESTAMP:  4d9f8bf2

FAILURE_BUCKET_ID:  0x8E_kerneld+4d0b

BUCKET_ID:  0x8E_kerneld+4d0b

Followup: MachineOwner
---------


Code:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 8f0c4a1b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f7d848
Unable to read MiSystemVaType memory at 82f5ce20
ffffffff 

FAULTING_IP: 
igdkmd32+bca1b
8f0c4a1b 8910            mov     dword ptr [eax],edx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 8f05606e to 8f0c4a1b

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
8ad83bd0 8f05606e 8601a000 00070070 8ad83be8 igdkmd32+0xbca1b
8ad83bec 8f29d3e9 8601a000 00070070 8ad83c20 igdkmd32+0x4e06e
8ad83bfc 8f2bd80a 8601a000 00070070 00000000 igdkmd32+0x2953e9
8ad83c20 8f2bd43c 86e35008 c25b19cc 8ad83c40 igdkmd32+0x2b580a
8ad83c54 8f2bc89b 86e35008 8ad83c7c 856ffde8 igdkmd32+0x2b543c
8ad83cc0 8f2bd900 86e35008 00000341 00000000 igdkmd32+0x2b489b
8ad83cd8 8f03f664 8601a000 00000000 856ffde8 igdkmd32+0x2b5900
8ad83cec 83028466 85a70680 850f0e70 84e01918 igdkmd32+0x37664
8ad83d00 82e91aab 856ffde8 00000000 84e01918 nt!IopProcessWorkItem+0x23
8ad83d50 8301cf64 00000001 9559be87 00000000 nt!ExpWorkerThread+0x10d
8ad83d90 82ec5219 82e9199e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  kb

FOLLOWUP_IP: 
igdkmd32+bca1b
8f0c4a1b 8910            mov     dword ptr [eax],edx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  igdkmd32+bca1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: igdkmd32

IMAGE_NAME:  igdkmd32.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d746355

FAILURE_BUCKET_ID:  0x50_igdkmd32+bca1b

BUCKET_ID:  0x50_igdkmd32+bca1b

Followup: MachineOwner
---------



DRIVERS


Code:
start    end        module name
80bd4000 80bdc000   kdcom    kdcom.dll    Tue Jul 14 02:08:58 2009 (4A5BDAAA)
81e00000 81e13000   rspndr   rspndr.sys   Tue Jul 14 00:53:20 2009 (4A5BC8F0)
81f0f000 81f1b000   kbdhid   kbdhid.sys   Sat Nov 20 09:50:10 2010 (4CE799D2)
81f1b000 81f28000   crashdmp crashdmp.sys Tue Jul 14 00:45:50 2009 (4A5BC72E)
81f28000 81f33000   dump_pciidex dump_pciidex.sys Tue Jul 14 00:11:16 2009 (4A5BBF14)
81f33000 81f3d000   dump_msahci dump_msahci.sys Sat Nov 20 09:50:48 2010 (4CE799F8)
81f3d000 81f4e000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 00:12:47 2009 (4A5BBF6F)
81f59000 81f74000   luafv    luafv.sys    Tue Jul 14 00:15:44 2009 (4A5BC020)
81f74000 81fac000   aswMonFlt aswMonFlt.sys Tue May 10 12:59:43 2011 (4DC928AF)
81fac000 81faeb00   aswFsBlk aswFsBlk.SYS Tue May 10 12:59:33 2011 (4DC928A5)
81faf000 81fc9000   WudfPf   WudfPf.sys   Sat Nov 20 09:58:55 2010 (4CE79BDF)
81fc9000 81fd7000   vmnetbridge vmnetbridge.sys Mon Aug 10 13:05:29 2009 (4A800D09)
81fd7000 81fd9f00   VMNET    VMNET.SYS    Mon Aug 10 13:03:57 2009 (4A800CAD)
81fda000 81fea000   lltdio   lltdio.sys   Tue Jul 14 00:53:18 2009 (4A5BC8EE)
81fea000 81ffa000   ndisuio  ndisuio.sys  Sat Nov 20 10:06:36 2010 (4CE79DAC)
82e14000 83226000   nt       ntkrpamp.exe Sat Apr 09 04:49:39 2011 (4D9FD753)
83226000 8325d000   hal      halmacpi.dll Sat Nov 20 08:37:38 2010 (4CE788D2)
88624000 886a9000   mcupdate mcupdate.dll Sat Nov 20 12:00:54 2010 (4CE7B876)
886a9000 886ba000   PSHED    PSHED.dll    Tue Jul 14 02:09:36 2009 (4A5BDAD0)
886ba000 886c2000   BOOTVID  BOOTVID.dll  Tue Jul 14 02:04:34 2009 (4A5BD9A2)
886c2000 88704000   CLFS     CLFS.SYS     Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88704000 887af000   CI       CI.dll       Sat Nov 20 12:05:17 2010 (4CE7B97D)
887af000 887d2000   ataport  ataport.SYS  Sat Nov 20 08:38:00 2010 (4CE788E8)
887d2000 887db000   amdxata  amdxata.sys  Fri Mar 19 16:19:01 2010 (4BA3A3F5)
88800000 88812000   winhv    winhv.sys    Sat Nov 20 08:38:15 2010 (4CE788F7)
88812000 8881b000   atapi    atapi.sys    Tue Jul 14 00:11:15 2009 (4A5BBF13)
8881b000 88825000   msahci   msahci.sys   Sat Nov 20 09:50:48 2010 (4CE799F8)
88825000 88833000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 00:11:15 2009 (4A5BBF13)
88833000 888a4000   Wdf01000 Wdf01000.sys Tue Jul 14 00:11:36 2009 (4A5BBF28)
888a4000 888b2000   WDFLDR   WDFLDR.SYS   Tue Jul 14 00:11:25 2009 (4A5BBF1D)
888b2000 888fa000   ACPI     ACPI.sys     Sat Nov 20 08:37:52 2010 (4CE788E0)
888fa000 88903000   WMILIB   WMILIB.SYS   Tue Jul 14 00:11:22 2009 (4A5BBF1A)
88903000 8890b000   msisadrv msisadrv.sys Tue Jul 14 00:11:09 2009 (4A5BBF0D)
8890b000 88935000   pci      pci.sys      Sat Nov 20 08:37:57 2010 (4CE788E5)
88935000 88940000   vdrvroot vdrvroot.sys Tue Jul 14 00:46:19 2009 (4A5BC74B)
88940000 88951000   partmgr  partmgr.sys  Sat Nov 20 08:38:14 2010 (4CE788F6)
88951000 88959000   compbatt compbatt.sys Tue Jul 14 00:19:18 2009 (4A5BC0F6)
88959000 88964000   BATTC    BATTC.SYS    Tue Jul 14 00:19:15 2009 (4A5BC0F3)
88964000 88974000   volmgr   volmgr.sys   Sat Nov 20 08:38:06 2010 (4CE788EE)
88974000 889bf000   volmgrx  volmgrx.sys  Tue Jul 14 00:11:41 2009 (4A5BBF2D)
889bf000 889d5000   mountmgr mountmgr.sys Sat Nov 20 08:38:09 2010 (4CE788F1)
889d5000 889fe180   vmbus    vmbus.sys    Sat Nov 20 09:14:58 2010 (4CE79192)
88a00000 88a259c0   VBoxDrv  VBoxDrv.sys  Tue Apr 26 14:10:29 2011 (4DB6C445)
88a26000 88a37000   termdd   termdd.sys   Sat Nov 20 10:21:10 2010 (4CE7A116)
88a3a000 88a6e000   fltmgr   fltmgr.sys   Tue Jul 14 00:11:13 2009 (4A5BBF11)
88a6e000 88a7f000   fileinfo fileinfo.sys Tue Jul 14 00:21:51 2009 (4A5BC18F)
88a7f000 88bae000   Ntfs     Ntfs.sys     Fri Mar 11 03:21:11 2011 (4D799527)
88bae000 88bd9000   msrpc    msrpc.sys    Tue Jul 14 00:11:59 2009 (4A5BBF3F)
88bd9000 88bec000   ksecdd   ksecdd.sys   Sat Nov 20 08:38:54 2010 (4CE7891E)
88bec000 88bff000   wanarp   wanarp.sys   Sat Nov 20 10:07:45 2010 (4CE79DF1)
88c00000 88c0ee80   WMDrive  WMDrive.sys  Sun Aug 22 18:14:17 2010 (4C715AE9)
88c1b000 88c78000   cng      cng.sys      Tue Jul 14 00:32:55 2009 (4A5BC427)
88c78000 88c86000   pcw      pcw.sys      Tue Jul 14 00:11:10 2009 (4A5BBF0E)
88c86000 88c8f000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 00:11:14 2009 (4A5BBF12)
88c8f000 88d46000   ndis     ndis.sys     Sat Nov 20 08:39:19 2010 (4CE78937)
88d46000 88d84000   NETIO    NETIO.SYS    Sat Nov 20 08:40:03 2010 (4CE78963)
88d84000 88da9000   ksecpkg  ksecpkg.sys  Tue Jul 14 00:34:00 2009 (4A5BC468)
88dd1000 88df0000   cdrom    cdrom.sys    Sat Nov 20 08:38:09 2010 (4CE788F1)
88df0000 88dfe000   netbios  netbios.sys  Tue Jul 14 00:53:54 2009 (4A5BC912)
88e00000 88e25000   CLASSPNP CLASSPNP.SYS Tue Jul 14 00:11:20 2009 (4A5BBF18)
88e26000 88f70000   tcpip    tcpip.sys    Sat Nov 20 08:41:36 2010 (4CE789C0)
88f70000 88fa1000   fwpkclnt fwpkclnt.sys Sat Nov 20 08:39:08 2010 (4CE7892C)
88fa1000 88fb1000   mup      mup.sys      Tue Jul 14 00:14:14 2009 (4A5BBFC6)
88fb1000 88fe3000   fvevol   fvevol.sys   Sat Nov 20 08:40:22 2010 (4CE78976)
88fe3000 88ff4000   disk     disk.sys     Tue Jul 14 00:11:28 2009 (4A5BBF20)
89000000 8902d000   rdyboost rdyboost.sys Sat Nov 20 09:00:07 2010 (4CE78E17)
8902d000 89035000   hwpolicy hwpolicy.sys Sat Nov 20 08:37:35 2010 (4CE788CF)
89037000 890c8100   timntr   timntr.sys   Wed Jun 02 13:57:37 2010 (4C065541)
890c9000 890d1380   vmstorfl vmstorfl.sys Sat Nov 20 09:14:37 2010 (4CE7917D)
890d2000 89111000   volsnap  volsnap.sys  Sat Nov 20 08:38:13 2010 (4CE788F5)
89111000 891c6fa0   tdrpm273 tdrpm273.sys Tue Aug 10 10:56:21 2010 (4C612245)
891c7000 891cf000   spldr    spldr.sys    Mon May 11 17:13:47 2009 (4A084EBB)
891cf000 891f6f80   snapman  snapman.sys  Tue Aug 10 11:15:28 2010 (4C6126C0)
8e418000 8e459000   rdbss    rdbss.sys    Sat Nov 20 08:42:44 2010 (4CE78A04)
8e459000 8e463000   nsiproxy nsiproxy.sys Tue Jul 14 00:12:08 2009 (4A5BBF48)
8e463000 8e46d000   mssmbios mssmbios.sys Tue Jul 14 00:19:25 2009 (4A5BC0FD)
8e46d000 8e479000   discache discache.sys Tue Jul 14 00:24:04 2009 (4A5BC214)
8e479000 8e4dd000   csc      csc.sys      Sat Nov 20 08:44:32 2010 (4CE78A70)
8e4dd000 8e4f5000   dfsc     dfsc.sys     Sat Nov 20 08:42:32 2010 (4CE789F8)
8e4f5000 8e503000   blbdrive blbdrive.sys Tue Jul 14 00:23:04 2009 (4A5BC1D8)
8e503000 8e54c180   aswSP    aswSP.SYS    Tue May 10 13:03:43 2011 (4DC9299F)
8e54d000 8e56e000   tunnel   tunnel.sys   Sat Nov 20 10:06:40 2010 (4CE79DB0)
8e56e000 8e58d000   HDAudBus HDAudBus.sys Sat Nov 20 09:59:28 2010 (4CE79C00)
8e58d000 8e5d3000   nwifi    nwifi.sys    Tue Jul 14 00:51:59 2009 (4A5BC89F)
8e600000 8e611000   vwififlt vwififlt.sys Tue Jul 14 00:52:03 2009 (4A5BC8A3)
8e611000 8e619dc0   VBoxUSBMon VBoxUSBMon.sys Tue Apr 26 14:10:30 2011 (4DB6C446)
8e61e000 8e68e000   aswSnx   aswSnx.SYS   Tue May 10 13:03:53 2011 (4DC929A9)
8e68e000 8e695000   Null     Null.SYS     Tue Jul 14 00:11:12 2009 (4A5BBF10)
8e695000 8e69c000   Beep     Beep.SYS     Tue Jul 14 00:45:00 2009 (4A5BC6FC)
8e69c000 8e6a8000   vga      vga.sys      Tue Jul 14 00:25:50 2009 (4A5BC27E)
8e6a8000 8e6c9000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 00:25:49 2009 (4A5BC27D)
8e6c9000 8e6d6000   watchdog watchdog.sys Tue Jul 14 00:24:10 2009 (4A5BC21A)
8e6d6000 8e6de000   RDPCDD   RDPCDD.sys   Sat Nov 20 10:22:19 2010 (4CE7A15B)
8e6de000 8e6e6000   rdpencdd rdpencdd.sys Tue Jul 14 01:01:39 2009 (4A5BCAE3)
8e6e6000 8e6ee000   rdprefmp rdprefmp.sys Tue Jul 14 01:01:41 2009 (4A5BCAE5)
8e6ee000 8e6f9000   Msfs     Msfs.SYS     Tue Jul 14 00:11:26 2009 (4A5BBF1E)
8e6f9000 8e707000   Npfs     Npfs.SYS     Tue Jul 14 00:11:31 2009 (4A5BBF23)
8e707000 8e71e000   tdx      tdx.sys      Sat Nov 20 08:39:17 2010 (4CE78935)
8e71e000 8e72a000   TDI      TDI.SYS      Sat Nov 20 08:39:18 2010 (4CE78936)
8e72a000 8e733f00   aswTdi   aswTdi.SYS   Tue May 10 13:02:35 2011 (4DC9295B)
8e734000 8e78e000   afd      afd.sys      Sat Nov 20 08:40:00 2010 (4CE78960)
8e78e000 8e792200   aswRdr   aswRdr.SYS   Tue May 10 12:59:54 2011 (4DC928BA)
8e793000 8e7c5000   netbt    netbt.sys    Sat Nov 20 08:39:22 2010 (4CE7893A)
8e7c5000 8e7ce000   ws2ifsl  ws2ifsl.sys  Tue Jul 14 00:55:01 2009 (4A5BC955)
8e7ce000 8e7d5000   wfplwf   wfplwf.sys   Tue Jul 14 00:53:51 2009 (4A5BC90F)
8e7d5000 8e7f4000   pacer    pacer.sys    Tue Jul 14 00:53:58 2009 (4A5BC916)
8f008000 8fa99000   igdkmd32 igdkmd32.sys Mon Mar 07 04:47:17 2011 (4D746355)
8fa99000 8fb50000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 09:08:14 2010 (4CE78FFE)
8fb50000 8fb89000   dxgmms1  dxgmms1.sys  Thu Feb 03 03:45:05 2011 (4D4A24C1)
8fb89000 8fb93080   HECI     HECI.sys     Thu Sep 17 20:54:12 2009 (4AB293E4)
8fb94000 8fba3000   usbehci  usbehci.sys  Fri Mar 25 02:57:58 2011 (4D8C04B6)
8fba3000 8fbee000   USBPORT  USBPORT.SYS  Fri Mar 25 02:58:05 2011 (4D8C04BD)
90218000 904b1000   bcmwl6   bcmwl6.sys   Fri Jan 22 03:30:34 2010 (4B591BDA)
904b1000 904bb000   vwifibus vwifibus.sys Tue Jul 14 00:52:02 2009 (4A5BC8A2)
904bb000 904cd000   L1C62x86 L1C62x86.sys Mon Sep 27 07:36:14 2010 (4CA03B5E)
904cd000 904e5000   i8042prt i8042prt.sys Tue Jul 14 00:11:23 2009 (4A5BBF1B)
904e5000 904ff080   keyscrambler keyscrambler.sys Thu Feb 11 15:03:17 2010 (4B741C35)
90500000 9050d000   kbdclass kbdclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
9050d000 90511600   VMkbd    VMkbd.sys    Tue Sep 21 09:46:16 2010 (4C9870D8)
90512000 90548980   SynTP    SynTP.sys    Fri Nov 13 03:39:49 2009 (4AFCD505)
90549000 9054a700   USBD     USBD.SYS     Fri Mar 25 02:57:53 2011 (4D8C04B1)
9054b000 90558000   mouclass mouclass.sys Tue Jul 14 00:11:15 2009 (4A5BBF13)
90558000 90578580   Impcd    Impcd.sys    Fri Feb 26 23:31:23 2010 (4B8859CB)
90579000 9058b000   intelppm intelppm.sys Tue Jul 14 00:11:03 2009 (4A5BBF07)
9058b000 90594000   wmiacpi  wmiacpi.sys  Tue Jul 14 00:19:16 2009 (4A5BC0F4)
90594000 90597700   CmBatt   CmBatt.sys   Tue Jul 14 00:19:18 2009 (4A5BC0F6)
90598000 905dc000   usbhub   usbhub.sys   Fri Mar 25 02:58:34 2011 (4D8C04DA)
905dc000 905ffc00   usbvideo usbvideo.sys Sat Nov 20 10:00:20 2010 (4CE79C34)
90600000 90611000   NDProxy  NDProxy.SYS  Sat Nov 20 10:07:39 2010 (4CE79DEB)
90611000 90624000   HIDCLASS HIDCLASS.SYS Sat Nov 20 09:59:37 2010 (4CE79C09)
90624000 9062a480   HIDPARSE HIDPARSE.SYS Tue Jul 14 00:50:59 2009 (4A5BC863)
90633000 906fc000   cfosspeed cfosspeed.sys Tue Feb 10 11:02:05 2009 (49915EAD)
906fc000 90709000   CompositeBus CompositeBus.sys Sat Nov 20 09:50:21 2010 (4CE799DD)
90709000 9071b000   AgileVpn AgileVpn.sys Tue Jul 14 00:55:00 2009 (4A5BC954)
9071b000 90733000   rasl2tp  rasl2tp.sys  Tue Jul 14 00:54:33 2009 (4A5BC939)
90733000 9073e000   ndistapi ndistapi.sys Tue Jul 14 00:54:24 2009 (4A5BC930)
9073e000 90760000   ndiswan  ndiswan.sys  Sat Nov 20 10:07:48 2010 (4CE79DF4)
90760000 90778000   raspppoe raspppoe.sys Tue Jul 14 00:54:53 2009 (4A5BC94D)
90778000 9078f000   raspptp  raspptp.sys  Tue Jul 14 00:54:47 2009 (4A5BC947)
9078f000 907a6000   rassstp  rassstp.sys  Tue Jul 14 00:54:57 2009 (4A5BC951)
907a6000 907b0000   rdpbus   rdpbus.sys   Tue Jul 14 01:02:40 2009 (4A5BCB20)
907b0000 907b1380   swenum   swenum.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
907b2000 907e6000   ks       ks.sys       Sat Nov 20 09:50:17 2010 (4CE799D9)
907e6000 907f4000   umbus    umbus.sys    Sat Nov 20 10:00:23 2010 (4CE79C37)
907f4000 907ff000   mouhid   mouhid.sys   Tue Jul 14 00:45:08 2009 (4A5BC704)
90c00000 90c0b000   hidusb   hidusb.sys   Sat Nov 20 09:59:38 2010 (4CE79C0A)
90c0e000 90f4c940   RTKVHDA  RTKVHDA.sys  Thu Feb 24 10:17:00 2011 (4D66301C)
90f4d000 90f7c000   portcls  portcls.sys  Tue Jul 14 00:51:00 2009 (4A5BC864)
90f7c000 90f95000   drmk     drmk.sys     Tue Jul 14 01:36:05 2009 (4A5BD2F5)
90f95000 90fdb000   IntcDAud IntcDAud.sys Fri Oct 15 09:27:18 2010 (4CB81066)
90fdb000 90fe5000   Dxapi    Dxapi.sys    Tue Jul 14 00:25:25 2009 (4A5BC265)
90fe5000 90ffc000   usbccgp  usbccgp.sys  Fri Mar 25 02:58:06 2011 (4D8C04BE)
92010000 92019000   TSDDD    TSDDD.dll    Tue Jul 14 01:01:40 2009 (4A5BCAE4)
92040000 9205e000   cdd      cdd.dll      Sat Nov 20 11:56:35 2010 (4CE7B773)
921b0000 923fe000   win32k   win32k.sys   Thu Mar 03 03:42:10 2011 (4D6F0E12)
ad21f000 ad2a4000   HTTP     HTTP.sys     Sat Nov 20 08:40:17 2010 (4CE78971)
ad2a4000 ad2bd000   bowser   bowser.sys   Wed Feb 23 04:47:32 2011 (4D649164)
ad2bd000 ad2cf000   mpsdrv   mpsdrv.sys   Tue Jul 14 00:52:52 2009 (4A5BC8D4)
ad2cf000 ad2f2000   mrxsmb   mrxsmb.sys   Wed Feb 23 04:47:34 2011 (4D649166)
ad2f2000 ad32d000   mrxsmb10 mrxsmb10.sys Wed Feb 23 04:47:43 2011 (4D64916F)
ad32d000 ad348000   mrxsmb20 mrxsmb20.sys Wed Feb 23 04:47:39 2011 (4D64916B)
ad360000 ad36a000   hcmon    hcmon.sys    Tue Sep 21 08:55:58 2010 (4C98650E)
ad36a000 ad37ca00   SENTINEL SENTINEL.SYS Thu Sep 26 06:47:32 2002 (3D929F74)
ad37d000 ad38ca00   vmci     vmci.sys     Tue Sep 21 08:23:00 2010 (4C985D54)
ad407000 ad457000   srv2     srv2.sys     Wed Feb 23 04:47:58 2011 (4D64917E)
ad457000 ad4a9000   srv      srv.sys      Wed Feb 23 04:48:14 2011 (4D64918E)
ad4a9000 ad4cf340   afcdp    afcdp.sys    Mon Aug 30 13:11:24 2010 (4C7B9FEC)
ad4d0000 ad4d0d00   TuneUpUtilitiesDriver32 TuneUpUtilitiesDriver32.sys Thu Sep 17 12:54:55 2009 (4AB2238F)
ad4d1000 ad4dc000   AIDA64Driver AIDA64Driver.sys Fri Apr 08 23:28:02 2011 (4D9F8BF2)
ad4dc000 ad4e5000   asyncmac asyncmac.sys Tue Jul 14 00:54:46 2009 (4A5BC946)
ad4fb000 ad506000   monitor  monitor.sys  Tue Jul 14 00:25:58 2009 (4A5BC286)
ad506000 ad50f000   vwifimp  vwifimp.sys  Tue Jul 14 00:52:09 2009 (4A5BC8A9)
ad515000 ad5ec000   netr28u  netr28u.sys  Wed May 26 11:21:27 2010 (4BFCF627)
aec00000 aec04c80   vmnetuserif vmnetuserif.sys Tue Sep 21 09:09:44 2010 (4C986848)
aec05000 aec08d80   vstor2_ws60 vstor2-ws60.sys Thu Aug 19 21:28:38 2010 (4C6D93F6)
aec20000 aeceee00   vmx86    vmx86.sys    Tue Sep 21 10:33:16 2010 (4C987BDC)
aecef000 aed19000   fastfat  fastfat.SYS  Tue Jul 14 00:14:01 2009 (4A5BBFB9)
aed19000 aed31000   idmwfp   idmwfp.sys   Mon Mar 28 18:36:01 2011 (4D90C701)
aed31000 aedc8000   peauth   peauth.sys   Tue Jul 14 01:35:44 2009 (4A5BD2E0)
aedc8000 aedd2000   secdrv   secdrv.SYS   Wed Sep 13 14:18:32 2006 (45080528)
aedd2000 aedf3000   srvnet   srvnet.sys   Wed Feb 23 04:47:53 2011 (4D649179)
aedf3000 aee00000   tcpipreg tcpipreg.sys Sat Nov 20 10:07:13 2010 (4CE79DD1)

Unloaded modules:
ad50f000 ad515000   vmusb.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00006000
81e38000 81f0f000   netr28u.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  000D7000
81e13000 81e1c000   vwifimp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
ad4f0000 ad4fb000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
ad4e5000 ad4f0000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
81f4e000 81f59000   monitor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
ad38d000 ad3f7000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0006A000
ad348000 ad360000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00018000
8e58d000 8e5bb000   RtsUStor.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002E000
88da9000 88db6000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000D000
88ff4000 88fff000   dump_pciidex
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000B000
88db6000 88dc0000   dump_msahci.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
88dc0000 88dd1000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00011000
 

try updating your drivers, some drivers are quite old

e.g

aedc8000 aedd2000 secdrv secdrv.SYS Wed Sep 13 14:18:32 2006 (45080528)
 

Solution
Back
Top